Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1834217guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
CCNC'10: Proceedings of the 7th IEEE conference on Consumer communications and networking conference
2010 Proceeding
Publisher:
  • IEEE Press
Conference:
Las Vegas Nevada USA January 9 - 12, 2010
ISBN:
978-1-4244-5175-3
Published:
09 January 2010

Reflects downloads up to 28 Dec 2024Bibliometrics
Abstract

No abstract available.

Article
A novel DDOS attack defending framework with minimized bilateral damages
Pages 1–5

Distributed Denial of Service (DDoS) attacks are one of the most damaging threats against Internet based applications. Many of the DDoS defense mechanisms may unintentionally deny a certain portion of legitimate user accesses by mistaking them as ...

Article
Interference-aware robust topology design in multi-channel wireless mesh networks
Pages 6–10

The performance of wireless networks can be significantly improved by multi-channel communications compared with single-channel communications since the use of multiple channels can reduce interference influence. In this paper, we study interference-...

Article
Advanced aggregation techniques for integrated next-generation WLAN and EPON networks
Pages 11–15

In this paper, we focus on the MAC enhancements of emerging high-throughput WLANs and introduce a novel fiber-wireless (FiWi) network architecture that integrates next-generation WLAN and EPON in a pay-as-you-grow manner while providing backward ...

Article
Analysis of delays in a peer-to-peer session initiation protocol overlay network
Pages 16–21

Peer-to-Peer Session Initiation Protocol (P2PJSIP) is a new decentralized person-to-person communication system that is currently being standardized in the Internet Engineering Task Force (IETF). P2PSIP uses the Session Initiation Protocol (SIP) to ...

Article
Aggregation network design methodologies for triple play services
Pages 22–26

Triple-play services and P2P IPTV have not only led to an increasing demand for bandwidth in broadband access networks, but also to the need for new service delivery architectures. The choice of an appropriate architectural approach and sizing model for ...

Article
An efficient context model for fast responsiveness of context-aware services in mobile networks
Pages 27–31

In order to provide context-aware services, context modeling is one of the most important tasks. Ontology has been widely accepted for the context modeling but it brings some overheads in the process of reasoning large-scale and dynamic information. In ...

Article
DOA estimation for wideband signal: multiple frequency bins versus multiple sensors
Pages 32–36

In conventional direction of arrival (DOA) estimation techniques, the inter-sensor spacing of an array is designed according to the minimal wavelength of an applied signal to avoid spatial ambiguity. This constraint greatly restricts the resolution of ...

Article
Optimizing substream scheduling for peer-to-peer live streaming
Pages 37–41

In peer-to-peer (P2P) live streaming using unstructured mesh, packet scheduling is an important factor on overall playback delay. The hybrid pull-push approach has been recently proposed to reduce delay compared to classical pulling method. In this ...

Article
Cell-cluster based traffic load balancing in cooperative cellular networks
Pages 42–46

Cooperative relaying is accepted as a promising solution to achieve high data rates over large areas in the future 4G wireless system. In this paper, a cell-cluster based traffic load balancing strategy is proposed to solve the problem of cell ...

Article
Enhancing video-on-demand playout over multiple heterogeneous access networks
Pages 47–51

Multimedia streaming is increasing in popularity and has become one of the dominating services on the Internet today. Even though user devices are often equipped with multiple network interfaces and in reach of several access networks at the same time, ...

Article
Two-dimensional differential demodulation for 64-DAPSK modulated OFDM signals
Pages 52–56

A novel two-dimensional differential demodulation (2-D DD) algorithm, which exploits both the time and frequency dimensions by using the orthogonal frequency division multiplexing (OFDM) frame structure, was investigated for 64-differential amplitude ...

Article
The impact of MS velocity on the performance of frequency selective scheduling in IEEE 802.16e mobile WiMAX
Pages 57–61

The OTA performance of Frequency Selective Scheduling (WiMAX Band AMC mode) is compared with that of Frequency Diverse Scheduling (WiMAX PUSC mode) as MS velocity is increased for Mobile WiMAX 802.16e. Frequency Selective Scheduling is shown to ...

Article
An admission control strategy for soft frequency reuse deployment of LTE systems
Pages 62–66

For UTRAN Long Tenn Evolution (LTE) systems, inter-cell interference is the most important interference source. Inter-cell interference coordination (ICIC) is considered to improve coverage and increase data rate at cell edge. The current consensus of ...

Article
Simulation-based analysis for a heterogeneous indoor localization scheme
Pages 67–71

In this paper, we focus on the indoor localization problem and we explore positioning solutions which are based on two popular wireless technologies, namely the wireless LAN (WLAN) and the radio frequency identification (RFID). WLAN-based localizers are ...

Article
Demonstration experiments towards practical IP traceback on the internet
Pages 72–76

Recently, Distributed Denial of Service (DDoS) attacks have become a critical issue on the Internet. Theoretical approaches into traceback systems to counter these attacks have been actively researched. However, with no instances of actual application ...

Article
A distributed channel assignment algorithm for uncoordinated WLANs
Pages 77–81

IEEE 802.11 WLANs are becoming more and more popular in homes and urban areas. As opposed to traditional WLANs, the access points (APs) in these networks are often deployed by network non-specialists in an uncoordinated manner, leading to unplanned ...

Article
Relation-based file management for portable device
Pages 82–86

As storage capacity in CE devices has been increased, the number and type of files has been increased accordingly. But traditional file systems generally use hierarchical directory/file structure to organize files. When we want to store and retrieve a ...

Article
Distributed reservation algorithms for video streaming over UWB-based home networks
Pages 87–92

UItra-wideband (UWB) is a new wireless technology that transfers data over shorter distances with higher data rates and lower transmission power. WiMedia Alliance's Media Access Control (MAC) protocols for UWB-based wireless personal area networks have ...

Article
P2P-based VOD content distribution platform with guaranteed video quality
Pages 93–97

In this paper, we propose a P2P-based content distribution mechanism for video-on-demand service in IPTV. Different from traditional P2P-based content distribution mechanisms our solution mainly focuses on how telecom operators utilize P2P' technology ...

Article
Improving robustness in an autonomous local sensor network
Pages 98–102

A traditional wireless sensor network is composed of several sensors and a sink. The sink analyzes data measured by the distributed sensors and takes appropriate action. A problem with this kind of architecture is that it may have a single-point of ...

Article
A distributed inter-cell interference coordination scheme in downlink multicell OFDMA systems
Pages 103–107

In this paper, the inter-cell interference coordination (ICIC) is investigated for the downlink transmission in OFDMA-based multi-cellular systems. The utility function is introduced to balance efficiency and fairness. Firstly, the system model is built ...

Article
Traffic pattern based resource hopping schemes of femto base stations
Pages 108–112

In this paper, we propose dynamic spectrum sharing methods for femto base stations (BSs) operated within a macro BS's spectrum area. As the spectrum sharing methods, we provide traffic pattern based resource hopping schemes of the femto BSs. Traffic ...

Article
Scheduling algorithm for multi-massive-online applications in multicast mobile networks
Pages 113–117

This paper describes a new multicast scheduling scheme for Multi-Massive-Online (MMO) applications in mobile networks. In order to reduce the amount of traffic volume, multicast channels should be fully utilized for information sharing among users while ...

Article
A throughput performance for a point-to-multipoint gigabit WLAN system on 60 GHz millimeter wave
Pages 118–122

Increasing demand on the broadband wireless communication over Gigabits has focused renewed attention on 60 GHz millimeter wave. We developed a novel Point-to-Multipoint (P2MP) Gigabit WLAN System on 60 GHz millimeter wave. The proposed system employed ...

Article
Trusted access to sensitive information in a diverse services environment
Pages 123–127

Mobile application service providers are trying to strike a balance between offering personalized services and safeguarding user privacy. Being able to offer targeted and relevant services requires access to sensitive user information, such as health ...

Article
Multi-user signal classification via spectral correlation
Pages 128–132

With the proliferation of wireless devices being used, the RF spectrum's capacity continues to dwindle. In recent years, a new technology called Cognitive Radio has been advocated to solve the impending spectral drought. The premise of Cognitive Radio ...

Article
Total intercarrier interference cancellation for OFDM mobile communication systems
Pages 133–137

For orthogonal frequency division multiplexing (OFDM) communication systems, the orthogonality among subcarriers is lost in mobile radio channels due to the frequency offsets caused by mobility. As a direct result, intercarrier interference (ICI) is ...

Article
A behavioral analysis engine for network traffic
Pages 138–142

Network intrusion detection systems continuously monitor the network traffic in order to identify any traces of suspicious activities such as worm, viruses or spam. One attractive technique for identifying potential Internet threats is detecting ...

Article
Photo-trail: building eye-level-view enhanced navigation technology
Pages 143–147

This paper describes how to provide an inexpensive capability that automatically captures, time-stamps, and georectifies single and 360 degree-panoramic eye-level imagery while the image-taker freely moves around the environment. These same images ...

Article
Mobility impact on centralized selection of mobile relays
Pages 148–152

This paper considers the impact of node mobility on the selection of tilIe lowest bit error rate (BER) relay path from access point to destination node in a downlink data transmission scenario. The access point uses link signal to noise ratio (SNR) ...

Index terms have been assigned to the content through auto-classification.

Recommendations