MobiLight 2010 - Special Session on "Mobility Concepts and IMT-Advanced (MOBILIA)" | |
Performance of MC-DS-CDMA System in Rayleigh Fading Channel with Non-coherent Combining Schemes and MAI Interference | p. 1 |
Spectral Efficiency Using Combinations of Transmit Antenna Selection with Linear Dispersion Code Selection | p. 11 |
A Reconfigurable Power Amplifier for Mobile WIMAX Applications | p. 22 |
An Access Selection Prototype Based on IEEE 802.21 | p. 31 |
Multi-hop Extensions to Heterogeneous Access Network Selection | p. 43 |
Experimental System Level Platform for B3G Scenarios | p. 57 |
MobiLight 2010 - Special Session on "QoS Provision in Wireless Networks (QPWN)" | |
TCP-Aware Forward Error Correction for Wireless Networks | p. 68 |
Delay Performance Analysis of a Two-Stage Cross-Layer Scheduler for Wireless LANs | p. 78 |
Access Network Selection in a Heterogeneous Environment Using the AHP and Fuzzy TOPSIS Methods | p. 88 |
Adaptive Message Ferry Route (aMFR) for Partitioned MANETs | p. 99 |
Lightweight Mechanisms for Self-Configuring Protocols | p. 112 |
Analysis of the Energy Consumption of JavaScript Based Mobile Web Applications | p. 124 |
MobiLight 2010 - Special Session on "Advanced Radio Access Techniques for Energy-Efficient Communications (MIMAX)" | |
Equal Gain MIMO Beamforming in the RF Domain for OFDM-WLAN Systems | p. 136 |
A Framework for the Design Space Exploration of Software-Defined Radio Applications | p. 148 |
On the Maximum Efficiency of Power Amplifiers in OFDM Broadcast Systems with Envelope Following | p. 160 |
Equal-Phase Beamforming Architecture for RF-MIMO Antenna Systems | p. 171 |
Optimal Channel and Power Allocation for Secondary Users in Cooperative Cognitive Radio Networks (Invited Paper) | p. 180 |
MobiLight 2010 - Special Session on "Security and Resilience in the Future Internet (Secure)" | |
User Authentication Method and Implementation Using a Three-Axis Accelerometer | p. 192 |
A Correlation Approach to Intrusion Detection | p. 203 |
A Dynamic Key Agreement Mechanism for Mission Critical Mobile Ad Hoc Networking | p. 216 |
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks | p. 229 |
Sensor Networks - Critical Infrastructure for Society? Challenges for Resilience, Security and Interoperability | p. 243 |
Wide-Weak Privacy-Preserving RFID Authentication Protocols | p. 254 |
A Preliminary Study of a Wireless Process Control Network Using Emulation Testbeds | p. 268 |
MobiLight 2010 - Special Session on "Self-Management in Future Internet Wireless Networks (SELFNET)" | p. 268 |
CogProt: A Framework for Cognitive Configuration and Optimization of Communication Protocols | p. 280 |
Topology Control in Self-managed Wireless Network | p. 292 |
Autonomicity and Self-manageability Techniques in the Scope of the Future Internet's Evolution | p. 302 |
Design and Development of Essential Use-Cases for Self-management in Future Internet Wireless Networks | p. 318 |
Towards Dynamic Protocol Configuration and its Configuration and Control in Autonomous Communication Environments | p. 334 |
Mobilight 2010 - Special Session on "Distributed Wireless Networking Experimental Infrastructure for Optimization and Convergence (ICARUS)" | |
Dynamic Call Admission Control for Enhanced GoS of UGS Connections during "Busy Hour" in WiMAX | p. 346 |
Mutual Information Effective SNR Mapping Algorithm for Fast Link Adaptation Model in 802.16e | p. 356 |
Virtual Distributed Simulation Platform for the Study and Optimization of Future Beyond 3G Heterogeneous Systems | p. 368 |
A Dual Head Clustering Mechanism for Energy Efficient WSNs | p. 380 |
Measuring the Closed-Loop Throughput of 2x2 HSDPA over TX Power and TX Antenna Spacing | p. 388 |
MobiLight 2010 - Special Session on "Critical Information Infrastructure Protection: Where We Stand and Where We Are Heading To (CIIP)" | |
Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective | p. 400 |
Improving Wireless Sensor Network Resilience with the Intersection Framework | p. 415 |
Trust Management in Monitoring Financial Critical Information Infrastructures | p. 427 |
Using MPIS in a Wireless Mesh Network to Improve the Resiliency of SCADA Systems | p. 440 |
Fusion of Bayesian and Ontology Approach Applied to Decision Support System for Critical Infrastructures Protection | p. 451 |
MobiLight 2010 - Special Session on "Advanced Wireless Technologies for a Converged Ultra-Broadband Home Network (Omega)" | |
Omega: New Use Cases for Future Home Networks | p. 464 |
Adaptive Filter Bank Modulation for Next Generation Wireless In-Home Networks | p. 472 |
Challenges in Gbps Wireless Optical Transmission | p. 484 |
An Efficient Power Control Algorithm for Supporting Cognitive Communications in Shared Spectrum Areas | p. 496 |
MobiLight 2010 - Special Sessions on "Advances on Indoor Positioning and Multiuser Scheduling (Newcom++)" and "Relay-Based Next Generation Wireless Broadband Networks and Associated Components (Rewind)" | |
TOA Estimation in UWB: Comparison between Time and Frequency Domain Processing | p. 506 |
Trade-off between Feedback Load for the Channel State Information and System Performance in MIMO Communications | p. 518 |
Evolution of Spatial and Multicarrier Scheduling: Towards Multi-cell Scenario | p. 530 |
Multi-hop Relay in Next Generation Wireless Broadband Access Networks: An Overview | p. 543 |
Eumobile 2010 - 1st European Symposium on "Mobility Management" | |
An Experimental MIH Platform for Testing Video Streaming Services across Heterogeneous Radio Access Technology Networks | p. 555 |
A Lightweight Macro-Mobility Framework | p. 567 |
Enhanced Localization in Wireless Ad Hoc Networks through Cooperation | p. 579 |
Increasing the VoIP Capacity through MAP Overhead Reduction in the IEEE 802.16 OFDMa Systems | p. 590 |
Multi-radio Cooperative ARQ in Wireless Cellular Networks: A Mac Layer Perspective | p. 604 |
Phyim 2010 - Workshop on "Advanced Physical Layer optimization Methods for Energy-Efficient Wireless Systems" | |
Joint Turbo Coding and Source-Controlled Modulation of Cycle-Stationary Sourcesin the Bandwidth-Limited Regime | p. 618 |
Harmony Search Heuristics for Quasi-asynchronous CDMA Detection with M-PAM Signalling | p. 626 |
Cross-Layer Clustering Optimization in Mobile Networks Using Evolutionary Algorithms | p. 638 |
A Case Study of Parameter Control in a Genetic Algorithm: Computer Network Performance | p. 650 |
On the Application of a Novel Grouping Harmony Search Algorithm to the Switch Location Problem | p. 662 |
Adaptive Weighted Round Robin (AWRR) Scheduling for Optimization of the Wireless Medium Virtualisation | p. 673 |
Robust Wireless Network Coding - An Overview | p. 685 |
UAS 2010 - Workshop on "User Adaptive Systems for Mobile Wireless Systems" Localization in Real GSM Network with Fingerprinting Utilization | p. 699 |
Customized Contents Service Over a DVB-SH/3G Network | p. 710 |
Measurement and Visualization of ECG on Mobile Monitoring Stations of Biotelemetric User Adaptive System | p. 722 |
Complex Mobile User Adaptive System Framework for Mobile Wireless Devices | p. 739 |
The Indoor Orientation of Autonomous Mobile Devices for Increasing Human Perspective | p. 755 |
Architecture and Design of Mobile Telemetry System for Ambient Assisted Living | p. 769 |
Author Index | p. 781 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.