default search action
5. CNSR 2007: Fredericton, New Brunswick, Canada
- Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 14-17 May 2006, Fredericton, New Brunswick, Canada. IEEE Computer Society 2007, ISBN 0-7695-2835-X
Tutorials
- Ekram Hossain:
IEEE802.16/WiMAX-Based Broadband Wireless Networks: Protocol Engineering, Applications, and Services. 3-4 - Antonio Alfredo Ferreira Loureiro, Linnyer Beatrys Ruiz:
Autonomic Wireless Networks in Smart Environments. 5-7 - Mohamed Youssef, Naser El-Sheimy:
Wireless Sensor Network: Research vs. Reality Design and Deployment Issues. 8-9 - Paul A. S. Ward:
The Services Network. 10-12
Sensor Networks I
- Abdellah Chehri, Paul Fortier, Pierre-Martin Tardif:
Security Monitoring Using Wireless Sensor Networks. 13-17 - N. Amini, Mahdi Fazeli, Seyed Ghassem Miremadi, M. T. Manzuri:
Distance-Based Segmentation: An Energy-Efficient Clustering Hierarchy for Wireless Microsensor Networks. 18-25 - Gregory Jaman, Sajid Hussain:
Structural Monitoring using Wireless Sensors and Controller Area Network. 26-34
Communication Systems
- Areeyata Sripetch, Poompat Saengudomlert:
Topology Design of Optical Networks Based on Existing Power Grids. 35-40 - Scott Melvin, Manmeet S. Goldy, Jacek Ilow:
Antenna Load Mismatch Effects in EER-Based Transmitters for Digital Audio Broadcasting. 41-46 - Xiaoyan Feng, Charalampos Tsimenidis, Bayan S. Sharif:
On the Use of Energy Activation Functions in Parallel Interference Cancellation for Asynchronous CDMA Systems. 47-54
Sensor Networks II
- Qinghua Wang, Tingting Zhang, Stefan Pettersson:
Bounding the Information Collection Performance of Wireless Sensor Network Routing. 55-62 - Kaushalya Premadasa, Björn Landfeldt:
Dynamically Re-Configurable Transport Protocols for Low-End Sensors in Wireless Networks. 63-70 - Md. Ashiqur Rahman, Sajid Hussain:
Energy Efficient Data Routing in Wireless Sensor Network: A Mixed Approach. 71-75 - John-Paul Arp, Bradford G. Nickerson:
A User Friendly Toolkit for Building Robust Environmental Sensor Networks. 76-84
Orthogonal Frequency Division Multiplexing
- Abolfazl Ghassemi, T. Aaron Gulliver:
PTS Peak Power Reduction of OFDM Signals with Low Complexity IFFTs. 85-92 - Eugene Golovins, Neco Ventura:
Modified Order-Recursive Least Squares Estimator for the Noisy OFDM Channels. 93-100 - Soheil Salari, Mahmoud Ahmadian, Mehrdad Ardebilipour, Vahid Meghdadi, Jean-Pierre Cances:
Carrier-Frequency Offset Estimation via the EM Algorithm for MIMO-OFDM Iterative Receivers. 101-106 - M. A. Nasr, Heba A. Shaban, William H. Tranter:
Outage Probability and Percentage of Cell Area for OFDMA Cellular Systems with Sectoring. 107-116
WEB
- Jie Zhang, Ali A. Ghorbani:
GUMSAWS: A Generic User Modeling Server for Adaptive Web Systems. 117-124 - M. Barouni-Ebrahimi, Ali A. Ghorbani:
A Novel Approach for Frequent Phrase Mining in Web Search Engine Query Streams. 125-132 - Hamidreza Baghi, Mohammadreza Barouni-Ebrahimi, Ali A. Ghorbani, Reza Zafarani:
ConnectA! : An Intelligent Search Engine based on Authors' Connectivity. 133-140 - Partheeban Chandrasekaran, Shikharesh Majumdar, Chung-Horng Lung, Laura Serghi:
Performance Analysis of Web Service Replica Selection in an Extranet. 141-147 - Faezeh Ensan, Ebrahim Bagheri, Mohsen Kahani:
The Application of Users' Collective Experience for Crafting Suitable Search Engine Query Recommendations. 148-156
Security I
- Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. Wassell, Frank Stajano:
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern. 157-165 - Traian Avram, Seungchan Oh, Salim Hariri:
Analyzing Attacks in Wireless Ad Hoc Network with Self-Organizing Maps. 166-175 - Zhikui Chen:
A Scenario for Identity Management in Daidalos. 176-183 - Ming-Yang Su, Jia-Feng Chang:
An Efficient and Secured Internet Key Exchange Protocol Design. 184-192 - V. Rhymend Uthariaraj, T. C. Rangarajan, S. Srinivasan:
A Security-Centric Comparative Study of PLEASE with Existing GKM Protocols. 192-202
Ad Hoc Networks and Emerging Communications Technologies I
- Pedro Ferreira, João Orvalho, Fernando Boavida:
A Middleware Architecture for Mobile and Pervasive Large-Scale Augmented Reality Games. 203-212 - Lily Li, Paul A. S. Ward:
Structural Unfairness in 802.11-basedWireless Mesh Networks. 213-220 - Mani Malekesmaeili, Mohsen Shiva, Mehdi Soltan:
Topology Optimization for Backbone Wireless Mesh Networks. 221-230
Communications Algorithms
- Fayyaz Siddiqui, Florence Danilo-Lemoine, David D. Falconer:
On Interference in Uplink SDMA SC-FDE system. 231-238 - C. L. Ho, Hsu-Hung Yang:
MP&A Mixed Decoding Algorithm for LDPC Codes. 239-244 - Jafar Ramadhan Mohammed:
A New Simple Adaptive Noise Cancellation Scheme Based On ALE and NLMS Filter. 245-254
Protocol Design and Analysis
- Yu Dong, Niki Pissinou, Jian Wang:
Concurrency Handling in TCP. 255-262 - Ali Al-Shaikhi, Jacek Ilow, Xin Liao:
An Adaptive FEC-based Packet Loss Recovery Scheme Using RZ Turbo Codes. 263-267 - Zikuan Liu, Jalal Almhana, Robert McGorman, Changle Li:
Capacity of Cellular CDMA Systems with Integrated Voice and Data Services. 268-274 - Changle Li, Jalal Almhana, Jiandong Li, Zikuan Liu, Robert McGorman:
An Adaptive IEEE 802.11 Scheme for Voice and Data Services in Wireless LANs. 275-282
Ultra-Wide Band Networks
- Huiling Gong, Hong Nie, Zhizhang (David) Chen:
Performance of UWB Systems with Suboptimal Receivers under IEEE 802.15.4a Industrial Environments. 283-286 - Hao Zhang, Wei Li, T. Aaron Gulliver:
Performance Analysis of Non-Orthogonal Pulse Position Modulation for Time-Hopping UWB Transmission. 287-293 - J. Chusing, Lunchakorn Wuttisittikulkij, S. Segkhoontod:
Achieving Rate Two Space-Time-Frequency Codes for Multiband UWB-MIMO Communication Systems Using Rotated Multidimensional Modulation. 294-301 - Shaohua Wu, Qinyu Zhang, Naitong Zhang:
A Two-step TOA Estimation Method for IR-UWB Ranging Systems. 302-310
Posters
- Afiya Kassim, Babak Esfandiari, Shikharesh Majumdar, Laura Serghi:
A Flexible Hybrid Architecture for Management of Distributed Web Service Registries. 311-313 - Hassan Moradi, Hassan Yeganeh, Maryam Fallahpour:
Type Approving the Signaling Systems. 314-316 - Olga Vorochek, Yevgen Biletskiy:
Toward Assessing Data Quality of Ontology Matching on the Web. 317-322
Security II
- Lanlan Hu, Yixian Yang, Xinxin Niu:
Improved Remote User Authentication Scheme Preserving User Anonymity. 323-328 - Hassan M. Elkamchouchi, Abdel-Aty M. Emarah, Esam A. A. Hagras:
Public Key Multi-Message Signcryption (PK-MMS) Scheme For Secure Communication Systems. 329-334 - Ebrahim Bagheri, Ali A. Ghorbani:
Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology. 335-344 - Riyad Alshammari, Sumalee Sonamthiang, Mohsen Teimouri, Denis Riordan:
Using Neuro-Fuzzy Approach to Reduce False Positive Alerts. 345-349 - Farnaz Gharibian, Ali A. Ghorbani:
Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection. 350-358
Ad Hoc Networks and Emerging Communications Technologies II
- Nick Sheep Dalton, Ruth Conroy Dalton:
The Theory of Natural Movement and its Application to the Simulation of Mobile Ad Hoc Networks (MANET). 359-363 - Hadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bhattacharya:
Testing Intrusion Detection Systems in MANET: A Comprehensive Study. 364-371 - Helena Rifà-Pous, Jordi Herrera-Joancomartí:
Secure Dynamic MANET On-demand (SEDYMO) Routing Protocol. 372-380 - Markus Borschbach, Mathias Vodel:
An Evolutionary Solution for Cross Layer Ad Hoc Connectivity Selection. 381-388
Traffic Engineering and Management
- Do J. Byun, John S. Baras:
A New Rate-based Active Queue Management: Adaptive Virtual Queue RED. 389-396 - Choudhury A. Al Sayeed, Dewan Tanvir Ahmed, Akbar Ghaffar Pour Rahbar:
Hybrid Maximal Matching for Input Buffered Crossbar Switches. 397-403 - Manuel Pedro, Edmundo Monteiro, Fernando Boavida:
Multi-Perspective Optimization of GEANTInter-domain Traffic. 403-409 - T. Srinivasan, D. Vijayalakshmi, A. A. Azeezunnisa:
PTSPM: A Novel PTS Based Prefix Matching Scheme with Reduced Collision for IPv6 Routers. 410-416
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.