


default search action
5. CNSR 2007: Fredericton, New Brunswick, Canada
- Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 14-17 May 2006, Fredericton, New Brunswick, Canada. IEEE Computer Society 2007, ISBN 0-7695-2835-X

Tutorials
- Ekram Hossain:

IEEE802.16/WiMAX-Based Broadband Wireless Networks: Protocol Engineering, Applications, and Services. 3-4 - Antonio Alfredo Ferreira Loureiro, Linnyer Beatrys Ruiz:

Autonomic Wireless Networks in Smart Environments. 5-7 - Mohamed Youssef, Naser El-Sheimy:

Wireless Sensor Network: Research vs. Reality Design and Deployment Issues. 8-9 - Paul A. S. Ward:

The Services Network. 10-12
Sensor Networks I
- Abdellah Chehri

, Paul Fortier
, Pierre-Martin Tardif:
Security Monitoring Using Wireless Sensor Networks. 13-17 - N. Amini, Mahdi Fazeli

, Seyed Ghassem Miremadi, M. T. Manzuri:
Distance-Based Segmentation: An Energy-Efficient Clustering Hierarchy for Wireless Microsensor Networks. 18-25 - Gregory Jaman, Sajid Hussain:

Structural Monitoring using Wireless Sensors and Controller Area Network. 26-34
Communication Systems
- Areeyata Sripetch, Poompat Saengudomlert:

Topology Design of Optical Networks Based on Existing Power Grids. 35-40 - Scott Melvin, Manmeet S. Goldy, Jacek Ilow:

Antenna Load Mismatch Effects in EER-Based Transmitters for Digital Audio Broadcasting. 41-46 - Xiaoyan Feng, Charalampos Tsimenidis, Bayan S. Sharif

:
On the Use of Energy Activation Functions in Parallel Interference Cancellation for Asynchronous CDMA Systems. 47-54
Sensor Networks II
- Qinghua Wang

, Tingting Zhang, Stefan Pettersson:
Bounding the Information Collection Performance of Wireless Sensor Network Routing. 55-62 - Kaushalya Premadasa, Björn Landfeldt:

Dynamically Re-Configurable Transport Protocols for Low-End Sensors in Wireless Networks. 63-70 - Md. Ashiqur Rahman, Sajid Hussain:

Energy Efficient Data Routing in Wireless Sensor Network: A Mixed Approach. 71-75 - John-Paul Arp, Bradford G. Nickerson:

A User Friendly Toolkit for Building Robust Environmental Sensor Networks. 76-84
Orthogonal Frequency Division Multiplexing
- Abolfazl Ghassemi, T. Aaron Gulliver:

PTS Peak Power Reduction of OFDM Signals with Low Complexity IFFTs. 85-92 - Eugene Golovins, Neco Ventura

:
Modified Order-Recursive Least Squares Estimator for the Noisy OFDM Channels. 93-100 - Soheil Salari, Mahmoud Ahmadian, Mehrdad Ardebilipour, Vahid Meghdadi, Jean-Pierre Cances:

Carrier-Frequency Offset Estimation via the EM Algorithm for MIMO-OFDM Iterative Receivers. 101-106 - M. A. Nasr, Heba A. Shaban, William H. Tranter:

Outage Probability and Percentage of Cell Area for OFDMA Cellular Systems with Sectoring. 107-116
WEB
- Jie Zhang, Ali A. Ghorbani:

GUMSAWS: A Generic User Modeling Server for Adaptive Web Systems. 117-124 - M. Barouni-Ebrahimi, Ali A. Ghorbani:

A Novel Approach for Frequent Phrase Mining in Web Search Engine Query Streams. 125-132 - Hamidreza Baghi, Mohammadreza Barouni-Ebrahimi, Ali A. Ghorbani, Reza Zafarani:

ConnectA! : An Intelligent Search Engine based on Authors' Connectivity. 133-140 - Partheeban Chandrasekaran, Shikharesh Majumdar, Chung-Horng Lung, Laura Serghi:

Performance Analysis of Web Service Replica Selection in an Extranet. 141-147 - Faezeh Ensan, Ebrahim Bagheri

, Mohsen Kahani
:
The Application of Users' Collective Experience for Crafting Suitable Search Engine Query Recommendations. 148-156
Security I
- Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. Wassell, Frank Stajano:

Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern. 157-165 - Traian Avram, Seungchan Oh, Salim Hariri:

Analyzing Attacks in Wireless Ad Hoc Network with Self-Organizing Maps. 166-175 - Zhikui Chen:

A Scenario for Identity Management in Daidalos. 176-183 - Ming-Yang Su, Jia-Feng Chang:

An Efficient and Secured Internet Key Exchange Protocol Design. 184-192 - V. Rhymend Uthariaraj, T. C. Rangarajan, S. Srinivasan:

A Security-Centric Comparative Study of PLEASE with Existing GKM Protocols. 192-202
Ad Hoc Networks and Emerging Communications Technologies I
- Pedro Ferreira

, João Orvalho, Fernando Boavida
:
A Middleware Architecture for Mobile and Pervasive Large-Scale Augmented Reality Games. 203-212 - Lily Li, Paul A. S. Ward:

Structural Unfairness in 802.11-basedWireless Mesh Networks. 213-220 - Mani Malekesmaeili, Mohsen Shiva, Mehdi Soltan:

Topology Optimization for Backbone Wireless Mesh Networks. 221-230
Communications Algorithms
- Fayyaz Siddiqui, Florence Danilo-Lemoine, David D. Falconer:

On Interference in Uplink SDMA SC-FDE system. 231-238 - C. L. Ho, Hsu-Hung Yang:

MP&A Mixed Decoding Algorithm for LDPC Codes. 239-244 - Jafar Ramadhan Mohammed

:
A New Simple Adaptive Noise Cancellation Scheme Based On ALE and NLMS Filter. 245-254
Protocol Design and Analysis
- Yu Dong, Niki Pissinou, Jian Wang:

Concurrency Handling in TCP. 255-262 - Ali Al-Shaikhi

, Jacek Ilow, Xin Liao:
An Adaptive FEC-based Packet Loss Recovery Scheme Using RZ Turbo Codes. 263-267 - Zikuan Liu, Jalal Almhana, Robert McGorman, Changle Li:

Capacity of Cellular CDMA Systems with Integrated Voice and Data Services. 268-274 - Changle Li, Jalal Almhana, Jiandong Li, Zikuan Liu, Robert McGorman:

An Adaptive IEEE 802.11 Scheme for Voice and Data Services in Wireless LANs. 275-282
Ultra-Wide Band Networks
- Huiling Gong, Hong Nie, Zhizhang (David) Chen

:
Performance of UWB Systems with Suboptimal Receivers under IEEE 802.15.4a Industrial Environments. 283-286 - Hao Zhang, Wei Li, T. Aaron Gulliver:

Performance Analysis of Non-Orthogonal Pulse Position Modulation for Time-Hopping UWB Transmission. 287-293 - J. Chusing, Lunchakorn Wuttisittikulkij, S. Segkhoontod:

Achieving Rate Two Space-Time-Frequency Codes for Multiband UWB-MIMO Communication Systems Using Rotated Multidimensional Modulation. 294-301 - Shaohua Wu, Qinyu Zhang

, Naitong Zhang:
A Two-step TOA Estimation Method for IR-UWB Ranging Systems. 302-310
Posters
- Afiya Kassim, Babak Esfandiari, Shikharesh Majumdar, Laura Serghi:

A Flexible Hybrid Architecture for Management of Distributed Web Service Registries. 311-313 - Hassan Moradi, Hassan Yeganeh, Maryam Fallahpour:

Type Approving the Signaling Systems. 314-316 - Olga Vorochek

, Yevgen Biletskiy:
Toward Assessing Data Quality of Ontology Matching on the Web. 317-322
Security II
- Lanlan Hu, Yixian Yang, Xinxin Niu:

Improved Remote User Authentication Scheme Preserving User Anonymity. 323-328 - Hassan M. Elkamchouchi, Abdel-Aty M. Emarah, Esam A. A. Hagras:

Public Key Multi-Message Signcryption (PK-MMS) Scheme For Secure Communication Systems. 329-334 - Ebrahim Bagheri

, Ali A. Ghorbani:
Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology. 335-344 - Riyad Alshammari, Sumalee Sonamthiang, Mohsen Teimouri, Denis Riordan:

Using Neuro-Fuzzy Approach to Reduce False Positive Alerts. 345-349 - Farnaz Gharibian, Ali A. Ghorbani:

Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection. 350-358
Ad Hoc Networks and Emerging Communications Technologies II
- Nick Sheep Dalton, Ruth Conroy Dalton

:
The Theory of Natural Movement and its Application to the Simulation of Mobile Ad Hoc Networks (MANET). 359-363 - Hadi Otrok

, Joey Paquet, Mourad Debbabi
, Prabir Bhattacharya:
Testing Intrusion Detection Systems in MANET: A Comprehensive Study. 364-371 - Helena Rifà-Pous

, Jordi Herrera-Joancomartí
:
Secure Dynamic MANET On-demand (SEDYMO) Routing Protocol. 372-380 - Markus Borschbach, Mathias Vodel:

An Evolutionary Solution for Cross Layer Ad Hoc Connectivity Selection. 381-388
Traffic Engineering and Management
- Do J. Byun, John S. Baras:

A New Rate-based Active Queue Management: Adaptive Virtual Queue RED. 389-396 - Choudhury A. Al Sayeed, Dewan Tanvir Ahmed, Akbar Ghaffar Pour Rahbar

:
Hybrid Maximal Matching for Input Buffered Crossbar Switches. 397-403 - Manuel Pedro

, Edmundo Monteiro
, Fernando Boavida
:
Multi-Perspective Optimization of GEANTInter-domain Traffic. 403-409 - T. Srinivasan, D. Vijayalakshmi, A. A. Azeezunnisa:

PTSPM: A Novel PTS Based Prefix Matching Scheme with Reduced Collision for IPv6 Routers. 410-416

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














