


default search action
International Journal of Communication Systems, Volume 25
Volume 25, Number 1, January 2012
- Niamat Ullah, M. Sanaullah Chowdhury, Pervez Khan, Sana Ullah, Kyung Sup Kwak:

Throughput and delay limits of chirp spread spectrum-based IEEE 802.15.4a. 1-15 - Renhui Xu

, Jianfeng Zhang, Ming Chen, Bingyang Wu, Hai Wang:
Pairwise subcarriers weighting for suppressing out-of-band radiation of OFDM. 16-29 - Liming Xie, Xiaohua Jia

, Kunxiao Zhou:
QoS multicast routing in cognitive radio ad hoc networks. 30-46 - Qi Xie:

A new authenticated key agreement for session initiation protocol. 47-54
Volume 25, Number 2, February 2012
- I-Ping Hsieh, Fu-Min Chang, Shang-Juh Kao:

A slot-based BS scheduling with maximum latency guarantee and capacity first in 802.16e networks. 55-66 - Milos Borenovic, Aleksandar Neskovic, Djuradj Budimir

:
Multi-system-multi-operator localization in PLMN using neural networks. 67-83 - Defa Hu, Qiaoliang Li:

Bandwidth efficient asymmetric fingerprinting scheme. 84-91 - Rosario Giuseppe Garroppo

, Stefano Giordano
, Luca Tavanti
:
A joint experimental and simulation study of the IEEE 802.11s HWMP protocol and airtime link metric. 92-110 - Yee Chieh Tan, Nordin Bin Ramli

, Teong Chee Chuah:
Time-domain equalizer for multicarrier systems in impulsive noise. 111-120 - Siavash Ghavami, Bahman Abolhassani:

Spectrum sensing and power/rate control in CDMA cognitive radio networks. 121-145 - Zafeirios C. Papazachos, Helen D. Karatza

:
Scheduling of frequently communicating tasks. 146-157 - Tao Zhang:

A framework for fiber delay-line buffers in packet-based asynchronous multifiber optical networks (PAMFONET). 158-168 - Masood Khosroshahy:

UARA in edge routers: an effective approach to user fairness and traffic shaping. 169-184 - Jianxin Liao, Qi Qi, Tonghong Li

, Yufei Cao, Xiaomin Zhu, Jingyu Wang
:
An optimized QoS scheme for IMS-NEMO in heterogeneous networks. 185-204 - Dongmei Jiang, Haixia Zhang, Dongfeng Yuan:

Joint precoding and power allocation for multiuser transmission in MIMO relay networks. 205-220 - Debiao He

, Jianhua Chen, Jin Hu:
A pairing-free certificateless authenticated key agreement protocol. 221-230 - A. V. Babu

, Susan Joshy:
Maximizing the data transmission rate of a cooperative relay system in an underwater acoustic channel. 231-253 - Shaowei Wang, Fangjiang Huang, Mindi Yuan, Sidan Du:

Resource allocation for multiuser cognitive OFDM networks with proportional rate constraints. 254-269
- Xianyi Rui, Jia Hou, Liulei Zhou:

Decode-and-forward with full-duplex relaying. 270-275
Volume 25, Number 3, March 2012
- Minglei Fu

, Zichun Le, Zhijun Zhu:
BFD-based failure detection and localization in IP over OBS/WDM multilayer network. 277-293 - Jung-Lang Yu, Chun-Hsien Wu, Ming-Feng Lee:

MC-CDMA MIMO systems with quasi-orthogonal space-time block codes: Channel estimation and multiuser detection. 294-313 - Shang-Juh Kao, Chia-Chuan Chuang:

Using GI-G-1 queuing model for rtPS performance evaluation in 802.16 networks. 314-327 - Yueming Lu, Yuefeng Ji:

Self-adaptive clock frequency recovery based on buffer control. 328-339 - Harumasa Kinoshita, Takuji Tachibana, Kenji Sugimoto:

Rank-based dynamic frequency hopping without strict coordination in IEEE 802.22 WRAN system. 340-355 - Sanjay K. Dhurandher, Mohammad S. Obaidat

, Megha Gupta:
Providing reliable and link stability-based geocasting model in underwater environment. 356-375 - Chin-Feng Lee, Hung-Yu Chien, Chi-Sung Laih:

Server-less RFID authentication and searching protocol with enhanced security. 376-385 - Davide Adami

, Christian Callegari
, Stefano Giordano
, Michele Pagano
, Teresa Pepe:
Skype-Hunter: A real-time system for the detection and classification of Skype traffic. 386-403 - Hanho Wang, Kyunbyoung Ko

, Choongchae Woo:
Maximized achievable rate of SINR-measurement-based spectrum sharing with binary feedback. 404-413
Volume 25, Number 4, April 2012
- Hamid Mala, Mohammad Dakhilalian

, Mohsen Shakiba:
Cryptanalysis of mCrypton - A lightweight block cipher for security of RFID tags and sensors. 415-426 - Kil-Woong Jang:

Meta-heuristic algorithms for channel scheduling problem in wireless sensor networks. 427-446 - Yun-Hsin Chuang

, Yuh-Min Tseng:
Towards generalized ID-based user authentication for mobile multi-server environment. 447-460 - Dzmitry Kliazovich, Simone Redana, Fabrizio Granelli

:
Cross-layer error recovery in wireless access networks: The ARQ proxy approach. 461-477 - Ho-Lung Hung, Jyh-Horng Wen:

Reduce-complexity fuzzy-inference-based iterative multiuser detection for wireless communication systems. 478-490 - Mourad Amad

, Ahmed Meddahi, Djamil Aïssani
, Gilles Vanwormhoudt:
GPM: A generic and scalable P2P model that optimizes tree depth for multicast communications. 491-514 - Shaoen Wu, Saad Biaz, Honggang Wang

:
Rate adaptation with loss diagnosis on IEEE 802.11 networks. 515-528 - Atta ur Rehman Khan

, Sajjad Ahmad Madani
, Khizar Hayat
, Samee Ullah Khan
:
Clustering-based power-controlled routing for mobile wireless sensor networks. 529-542 - Pooria Varahram

, Borhanuddin Mohd Ali:
Peak-to-average power ratio reduction and digital predistortion effects in power amplifiers in OFDM system. 543-552
Volume 25, Number 5, May 2012
- Jinsuk Baek, Paul S. Fisher, Minho Jo

, Hsiao-Hwa Chen:
A reliable overlay video transport protocol for multicast agents in wireless mesh networks. 553-570 - Rony Ohayon:

Virtual reservation scheme for supporting CBR multimedia services with strict QoS performance over WLAN and wireless mesh. 571-584 - Chin-Ling Chen, Cheng-Chi Lee

, Chao-Yung Hsu:
Mobile device integration of a fingerprint biometric remote authentication scheme. 585-597 - G. Y. Luo:

On-line wavelet filtering of narrowband noise in signal detection of spread spectrum system for location tracking. 598-615 - Hui Xiao, Rodrigo C. de Lamare

:
Reduced-rank space-time adaptive interference suppression for navigation systems based on QR decomposition and approximations of basis functions. 616-635 - Jianmin Zhang, Zhaoyang Zhang

, Haiyan Luo, Wei Wang, Guanding Yu:
Initial spectrum access control with QoS protection for active users in cognitive wireless networks. 636-651 - Fuu-Cheng Jiang, Der-Chen Huang, Chao-Tung Yang

, Chu-Hsing Lin, Kuo-Hsiung Wang:
Design strategy for optimizing power consumption of sensor node with Min(N, T) policy M/G/1 queuing models. 652-671 - Ruey-Maw Chen, Kuo-ta Hsieh:

Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions. 672-688
Volume 25, Number 6, June 2012
- Jong Hyuk Park, Isaac Woungang, Jianhua Ma, Fahim Kawsar:

Ubiquitous computing for communications and broadcasting. 689-690 - Younghee Kim, Doo-Soon Park, Hee-Wan Kim, Ungmo Kim:

A sliding window-based false-negative approach for ubiquitous data stream analysis. 691-716 - Gi Pyo Nam, Kang Ryoung Park, Sung-Joo Park, Seok-Pil Lee, Moo Young Kim:

A new query-by-humming system based on the score level fusion of two classifiers. 717-733 - Yeong-Sheng Chen, Der-Jiunn Deng, Yu-Ming Hsu, Sheng-De Wang:

Efficient uplink scheduling policy for variable bit rate traffic in IEEE 802.16 BWA systems. 734-748 - Sun-Mi Park, Ku-Jin Kim:

Color recognition with compact color features. 749-762 - Miguel Delgado Calvo-Flores, Javier Medina Quero, María Dolores Ruíz Lozano, María Amparo Vila Miranda

:
Integrating multimedia streaming from heterogeneous sources to JavaME mobile devices. 763-778 - Chung-Ming Huang, Shih Yang Lin

:
An early collision warning algorithm for vehicles based on V2V communication. 779-795 - Bhaskar Prasad Rimal

, Eunmi Choi:
A service-oriented taxonomical spectrum, cloudy challenges and opportunities of cloud computing. 796-819
Volume 25, Number 7, July 2012
- Jianhua He

, Zuoyin Tang
, Hsiao-Hwa Chen, Shu Wang:
Performance analysis of ONOE protocol - an IEEE 802.11 link adaptation algorithm. 821-831 - Xun Xiao, Shucheng Liu, Kejie Lu, Jianping Wang

:
MaxDiv: an optimal randomized spectrum access with maximum diversity scheme for cognitive radio networks. 832-848 - Vassilios G. Vassilakis

, Ioannis D. Moscholios, Michael D. Logothetis:
The extended connection-dependent threshold model for call-level performance analysis of multi-rate loss systems under the bandwidth reservation policy. 849-873 - M. Anwar Hossain, Mohammed Tarique

:
Effect of multipath fading and multiple access interference on broadband code division multiple access systems. 874-886 - Saad Mustafa

, Sajjad Ahmad Madani
, Kashif Bilal, Khizar Hayat
, Samee Ullah Khan
:
Stable-path multi-channel routing with extended level channel assignment. 887-902 - Mina Malekzadeh, Abdul Azim Abdul Ghani, Shamala Subramaniam:

A new security model to prevent denial-of-service attacks and violation of availability in wireless networks. 903-925 - Feng-Ming Yang, Wei-Mei Chen, Tzu-Kai Cheng, Jean-Lien C. Wu:

A study of QoS guarantee and fairness based on cross-layer channel state in Worldwide Interoperability for Microwave Access. 926-942 - Panagiotis Varzakas:

Channel capacity per user in a power and rate adaptive hybrid DS/FFH-CDMA cellular system over Rayleigh fading channels. 943-952 - Eunsung Oh

, Choongchae Woo:
Performance analysis of dynamic channel allocation based on the greedy approach for orthogonal frequency-division multiple access downlink systems. 953-961
Volume 25, Number 8, August 2012
- Suleyman Uludag

, Tom Imboden, Kemal Akkaya:
A taxonomy and evaluation for developing 802.11-based wireless mesh network testbeds. 963-990 - Mangalathu Jibukumar, Raja Datta

, Prabir Kumar Biswas:
Busy tone contention protocol: a new high-throughput and energy-efficient wireless local area network medium access control protocol using busy tone. 991-1014 - Jian-Hong Wang, Jen-Yi Pan

, Shih-Chuan Feng, Der-Jiunn Deng:
Enabling multiparty karaoke over Internet based on low-level computers: practice and experiment. 1015-1033 - Panagiotis Varzakas:

Optimum processing gain for a hybrid direct sequence/slow frequency hopping code division multiple access cellular system over Rayleigh fading channels: the direct sequence/slow frequency hopping code division multiple access case. 1034-1043 - Kai Ma, Qiaoni Han, Cailian Chen, Xinping Guan:

Bandwidth allocation for cooperative relay networks based on Nash bargaining solution. 1044-1058 - Surjadeep Sarkar, Basab Chatterjee, Ujjwal Maulik

, Baidyanath Biswas:
Elimination of truncation and round off error and enhancement of stability using a new split loop DPLL. 1059-1067 - Yi Guo, Zhenxing Wang, Shaopeng Luo, Yu Wang:

A cascading failure model for interdomain routing system. 1068-1076 - Yi Li, Hong Ji, Xi Li, Victor C. M. Leung

:
Dynamic channel selection with reinforcement learning for cognitive WLAN over fiber. 1077-1090
- Sunghyun Cho, Insoo Hwang, Vahid Tarokh, Cheolwoo You:

A practical transmit beamforming strategy for closed-loop MIMO communication. 1091-1099
Volume 25, Number 9, September 2012
- Feng Xia

, Laurence T. Yang, Lizhe Wang
, Alexey V. Vinel:
Internet of Things. 1101-1102
- Zhi Zhang, Zhonghai Lu, Qiang Chen, Xiaolang Yan, Li-Rong Zheng:

Code division multiple access/pulse position modulation ultra-wideband radio frequency identification for Internet of Things: concept and analysis. 1103-1121 - Weifeng Sun, Tong Fu, Feng Xia

, Zhenquan Qin
, Rong Cong:
A dynamic channel assignment strategy based on cross-layer design for wireless mesh networks. 1122-1138 - Yun Wang, Peizhong Shi, Kai Li, Zhikui Chen:

An energy efficient medium access control protocol for target tracking based on dynamic convey tree collaboration in wireless sensor networks. 1139-1159 - Tie Qiu, Yu Zhou, Feng Xia

, Naigao Jin, Lin Feng:
A localization strategy based on n-times trilateral centroid with weight. 1160-1177 - Yang Liu

, Zhikui Chen, Feng Xia
, Xiaoning Lv, Fanyu Bu:
An integrated scheme based on service classification in pervasive mobile services. 1178-1188 - Anhtuan Le

, Jonathan Loo
, Aboubaker Lasebae, Mahdi Aiash
, Yuan Luo:
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. 1189-1212 - Xi Ju, Hongwei Zhang, Divya Sakamuri:

NetEye: a user-centered wireless sensor network testbed for high-fidelity, robust experimentation. 1213-1229 - Huansheng Ning

, Sha Hu:
Technology classification, industry, and education for Future Internet of Things. 1230-1241
Volume 25, Number 10, October 2012
- Kun Yang, Xueqi Cheng, Giovanni Pau

:
Special Issue on: Interdisciplinary and cross-layer design of mobile social networks and wireless networks. 1243-1244 - Kun Yang, Xueqi Cheng, Liang Hu, Jianming Zhang

:
Mobile social networks: state-of-the-art and a new vision. 1245-1259 - Qingjie Wang, Jianrong Wang, Jian Yu, Mei Yu, Yan Zhang:

Trust-aware query routing in P2P social networks. 1260-1280 - Claudio E. Palazzi

, Armir Bujari
:
Social-aware delay tolerant networking for mobile-to-mobile file sharing. 1281-1299 - Shumao Ou, Hui Pan

, Feng Li:
Heterogeneous wireless access technology and its impact on forming and maintaining friendship through mobile social networks. 1300-1312
- Guiyun Liu, Bugong Xu, Hongbin Chen:

Decentralized estimation over noisy channels in cluster-based wireless sensor networks. 1313-1329 - Kun-Hsuan Liu, Jung-Shian Li, Chun-Yen Wang, Naveen K. Chilamkurti, Athanasios V. Vasilakos

:
Minimizing multiplayer interactive delay in multihop wireless networks. 1330-1349 - X. L. Huang, G. Wang, F. Hu:

A novel Haar wavelet-based vector BPSK-OFDM robust to channel spectral nulls and with reduced cyclic prefix length and PAPR. 1350-1362 - Yuan-Tse Yu, Sheau-Ru Tong:

Adaptive Transmission Control Protocol-trunking flow control mechanism for supporting proxy-assisted video on demand system. 1363-1380
Volume 25, Number 11, November 2012
- Bor-Jiunn Hwang, I-Shyan Hwang, Chih-Wei Huang:

Frame-based adaptive uplink scheduling algorithm in orthogonal frequency division multiple access-based Worldwide Interoperability for Microwave Access networks. 1381-1397 - Siguang Chen, Meng Wu, Weifeng Lu:

Compressed error and erasure correcting codes via rank-metric codes in random network coding. 1398-1414 - Stylianos Georgoulas, Klaus Moessner

:
Toward efficient protocol design through protocol profiling and performance assessment: using formal verification in a different context. 1415-1431 - Debiao He

, Jianhua Chen, Rui Zhang:
An efficient and provably-secure certificateless signature scheme without bilinear pairings. 1432-1442 - Marcos A. Simplício Jr.

, Rony R. M. Sakuragui:
Cryptanalysis of an efficient three-party password-based key exchange scheme. 1443-1449 - A. Yasin Citkaya, S. Selim Seker:

FEM modeling of SAR distribution and temperature increase in human brain from RF exposure. 1450-1464 - Xiaolin Zhou, Dingchen Zhang, Yandong Yang, Mohammad S. Obaidat

:
Network-coded multiple-source cooperation aided relaying for free-space optical transmission. 1465-1478
- A. Y. Abdulrahman, Tharek Abdul Rahman, S. K. Abdulrahim, Md. Rafiqul Islam:

Rain attenuation measurements over terrestrial microwave links operating at 15 GHz in Malaysia. 1479-1488 - Haewoon Nam, Youngok Kim:

A low-complexity single-carrier frequency-division multiple access transmitter. 1489-1495 - Kyunbyoung Ko

, Choongchae Woo:
Outage probability and channel capacity for the Nth best relay selection AF relaying over INID Rayleigh fading channels. 1496-1504 - Zhang-Jun Guan, Wei-Jiong Zhang, Xi-Lang Zhou:

Performance analysis of multi-antenna relay communication systems with MRC. 1505-1512
Volume 25, Number 12, December 2012
- Xiaonan Wang, Huanyan Qian:

Hierarchical and low-power IPv6 address configuration for wireless sensor networks. 1513-1529 - Hua Song, Xiaola Lin

:
An auction-based MAC protocol for cognitive radio networks. 1530-1549 - Euiyul Ko, Donghyeok An, Ikjun Yeom, Hyunsoo Yoon:

Congestion control for sudden bandwidth changes in TCP. 1550-1567 - Dapeng Wu

, Ruyan Wang, Yan Zhen:
Link stability-aware reliable packet transmitting mechanism in mobile ad hoc network. 1568-1584 - Long Cheng, Canfeng Chen, Jian Ma, Lei Shu

:
Contention-based geographic forwarding in asynchronous duty-cycled wireless sensor networks. 1585-1602 - Antonios G. Alexiou, Christos Bouras, Vasileios Kokkinos

, Andreas Papazois, George Tsichritzis:
Modulation and coding scheme selection in multimedia broadcast over a single frequency network-enabled long-term evolution networks. 1603-1619 - Jincheng Huang, Shinya Matsufuji, Takahiro Matsumoto

, Noriyoshi Kuroyanagi:
A ZCZ-CDMA system with BFSK modulation. 1620-1638
- Hongbin Tang, Xinsong Liu:

Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme. 1639-1644

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














