No abstract available.
A novel DDOS attack defending framework with minimized bilateral damages
Distributed Denial of Service (DDoS) attacks are one of the most damaging threats against Internet based applications. Many of the DDoS defense mechanisms may unintentionally deny a certain portion of legitimate user accesses by mistaking them as ...
Interference-aware robust topology design in multi-channel wireless mesh networks
The performance of wireless networks can be significantly improved by multi-channel communications compared with single-channel communications since the use of multiple channels can reduce interference influence. In this paper, we study interference-...
Advanced aggregation techniques for integrated next-generation WLAN and EPON networks
In this paper, we focus on the MAC enhancements of emerging high-throughput WLANs and introduce a novel fiber-wireless (FiWi) network architecture that integrates next-generation WLAN and EPON in a pay-as-you-grow manner while providing backward ...
Analysis of delays in a peer-to-peer session initiation protocol overlay network
Peer-to-Peer Session Initiation Protocol (P2PJSIP) is a new decentralized person-to-person communication system that is currently being standardized in the Internet Engineering Task Force (IETF). P2PSIP uses the Session Initiation Protocol (SIP) to ...
Aggregation network design methodologies for triple play services
Triple-play services and P2P IPTV have not only led to an increasing demand for bandwidth in broadband access networks, but also to the need for new service delivery architectures. The choice of an appropriate architectural approach and sizing model for ...
An efficient context model for fast responsiveness of context-aware services in mobile networks
In order to provide context-aware services, context modeling is one of the most important tasks. Ontology has been widely accepted for the context modeling but it brings some overheads in the process of reasoning large-scale and dynamic information. In ...
DOA estimation for wideband signal: multiple frequency bins versus multiple sensors
In conventional direction of arrival (DOA) estimation techniques, the inter-sensor spacing of an array is designed according to the minimal wavelength of an applied signal to avoid spatial ambiguity. This constraint greatly restricts the resolution of ...
Optimizing substream scheduling for peer-to-peer live streaming
In peer-to-peer (P2P) live streaming using unstructured mesh, packet scheduling is an important factor on overall playback delay. The hybrid pull-push approach has been recently proposed to reduce delay compared to classical pulling method. In this ...
Cell-cluster based traffic load balancing in cooperative cellular networks
Cooperative relaying is accepted as a promising solution to achieve high data rates over large areas in the future 4G wireless system. In this paper, a cell-cluster based traffic load balancing strategy is proposed to solve the problem of cell ...
Enhancing video-on-demand playout over multiple heterogeneous access networks
Multimedia streaming is increasing in popularity and has become one of the dominating services on the Internet today. Even though user devices are often equipped with multiple network interfaces and in reach of several access networks at the same time, ...
Two-dimensional differential demodulation for 64-DAPSK modulated OFDM signals
A novel two-dimensional differential demodulation (2-D DD) algorithm, which exploits both the time and frequency dimensions by using the orthogonal frequency division multiplexing (OFDM) frame structure, was investigated for 64-differential amplitude ...
The impact of MS velocity on the performance of frequency selective scheduling in IEEE 802.16e mobile WiMAX
The OTA performance of Frequency Selective Scheduling (WiMAX Band AMC mode) is compared with that of Frequency Diverse Scheduling (WiMAX PUSC mode) as MS velocity is increased for Mobile WiMAX 802.16e. Frequency Selective Scheduling is shown to ...
An admission control strategy for soft frequency reuse deployment of LTE systems
For UTRAN Long Tenn Evolution (LTE) systems, inter-cell interference is the most important interference source. Inter-cell interference coordination (ICIC) is considered to improve coverage and increase data rate at cell edge. The current consensus of ...
Simulation-based analysis for a heterogeneous indoor localization scheme
In this paper, we focus on the indoor localization problem and we explore positioning solutions which are based on two popular wireless technologies, namely the wireless LAN (WLAN) and the radio frequency identification (RFID). WLAN-based localizers are ...
Demonstration experiments towards practical IP traceback on the internet
Recently, Distributed Denial of Service (DDoS) attacks have become a critical issue on the Internet. Theoretical approaches into traceback systems to counter these attacks have been actively researched. However, with no instances of actual application ...
A distributed channel assignment algorithm for uncoordinated WLANs
IEEE 802.11 WLANs are becoming more and more popular in homes and urban areas. As opposed to traditional WLANs, the access points (APs) in these networks are often deployed by network non-specialists in an uncoordinated manner, leading to unplanned ...
Relation-based file management for portable device
As storage capacity in CE devices has been increased, the number and type of files has been increased accordingly. But traditional file systems generally use hierarchical directory/file structure to organize files. When we want to store and retrieve a ...
Distributed reservation algorithms for video streaming over UWB-based home networks
UItra-wideband (UWB) is a new wireless technology that transfers data over shorter distances with higher data rates and lower transmission power. WiMedia Alliance's Media Access Control (MAC) protocols for UWB-based wireless personal area networks have ...
P2P-based VOD content distribution platform with guaranteed video quality
In this paper, we propose a P2P-based content distribution mechanism for video-on-demand service in IPTV. Different from traditional P2P-based content distribution mechanisms our solution mainly focuses on how telecom operators utilize P2P' technology ...
Improving robustness in an autonomous local sensor network
A traditional wireless sensor network is composed of several sensors and a sink. The sink analyzes data measured by the distributed sensors and takes appropriate action. A problem with this kind of architecture is that it may have a single-point of ...
A distributed inter-cell interference coordination scheme in downlink multicell OFDMA systems
In this paper, the inter-cell interference coordination (ICIC) is investigated for the downlink transmission in OFDMA-based multi-cellular systems. The utility function is introduced to balance efficiency and fairness. Firstly, the system model is built ...
Traffic pattern based resource hopping schemes of femto base stations
In this paper, we propose dynamic spectrum sharing methods for femto base stations (BSs) operated within a macro BS's spectrum area. As the spectrum sharing methods, we provide traffic pattern based resource hopping schemes of the femto BSs. Traffic ...
Scheduling algorithm for multi-massive-online applications in multicast mobile networks
This paper describes a new multicast scheduling scheme for Multi-Massive-Online (MMO) applications in mobile networks. In order to reduce the amount of traffic volume, multicast channels should be fully utilized for information sharing among users while ...
A throughput performance for a point-to-multipoint gigabit WLAN system on 60 GHz millimeter wave
Increasing demand on the broadband wireless communication over Gigabits has focused renewed attention on 60 GHz millimeter wave. We developed a novel Point-to-Multipoint (P2MP) Gigabit WLAN System on 60 GHz millimeter wave. The proposed system employed ...
Trusted access to sensitive information in a diverse services environment
Mobile application service providers are trying to strike a balance between offering personalized services and safeguarding user privacy. Being able to offer targeted and relevant services requires access to sensitive user information, such as health ...
Multi-user signal classification via spectral correlation
With the proliferation of wireless devices being used, the RF spectrum's capacity continues to dwindle. In recent years, a new technology called Cognitive Radio has been advocated to solve the impending spectral drought. The premise of Cognitive Radio ...
Total intercarrier interference cancellation for OFDM mobile communication systems
For orthogonal frequency division multiplexing (OFDM) communication systems, the orthogonality among subcarriers is lost in mobile radio channels due to the frequency offsets caused by mobility. As a direct result, intercarrier interference (ICI) is ...
A behavioral analysis engine for network traffic
Network intrusion detection systems continuously monitor the network traffic in order to identify any traces of suspicious activities such as worm, viruses or spam. One attractive technique for identifying potential Internet threats is detecting ...
Photo-trail: building eye-level-view enhanced navigation technology
This paper describes how to provide an inexpensive capability that automatically captures, time-stamps, and georectifies single and 360 degree-panoramic eye-level imagery while the image-taker freely moves around the environment. These same images ...
Mobility impact on centralized selection of mobile relays
This paper considers the impact of node mobility on the selection of tilIe lowest bit error rate (BER) relay path from access point to destination node in a downlink data transmission scenario. The access point uses link signal to noise ratio (SNR) ...
Index Terms
- Proceedings of the 7th IEEE conference on Consumer communications and networking conference