E-Book, Englisch, Band 48, 490 Seiten
Filipe / Obaidat e-Business and Telecommunications
1. Auflage 2009
ISBN: 978-3-642-05197-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers
E-Book, Englisch, Band 48, 490 Seiten
Reihe: Communications in Computer and Information Science
ISBN: 978-3-642-05197-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book contains the best papers of the 5th International Conference on e-Business and Telecommunications, ICETE, which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and telecommunications. ICETE is a joint international conference integrating four major areas of knowledge that are divided into four corresponding conferences: ICE-B (International Conference on e-Business), SECRYPT (International Conference on Security and Cryptography), SIGMAP (International Conference on Signal Processing and Multimedia), and WINSYS (International Conferenceon Wireless Information Systems).
Autoren/Hrsg.
Weitere Infos & Material
1;Preface;5
2;Organization;6
3;Table of Contents;13
4;Invited Speakers;17
4.1;e-Business Innovation: The Next Decade;18
4.1.1;Demographic Cycles;18
4.1.1.1;The Next Decade;18
4.1.1.2;The Birth Cycle;19
4.1.1.3;The Spending Cycle;19
4.1.1.4;The Economic Cycle;19
4.1.2;Technology Cycles;20
4.1.2.1;The 80-Year Cycle;20
4.1.2.2;The Internet S-Curve;21
4.1.2.3;The Wireless S-Curve;21
4.1.2.4;The Broadband S-Curve;21
4.1.3;Context Aware e-Business;21
4.1.3.1;Arrival of Mass Affluence;22
4.1.3.2;Premium Market Growth;22
4.1.3.3;Old Culture Scrutinized;22
4.1.3.4;Corporate Power Shifts;23
4.1.3.5;New Management Model;23
4.1.4;Customer-Based Organization;23
4.1.4.1;End-to-End Transaction;24
4.1.4.2;Customer-based Business Design;24
4.1.4.3;Business Replication by Market;24
4.1.4.4;Full Service Response;24
4.1.4.5;Browsers and Butlers;24
4.1.5;Adaptive Solutions;25
4.1.5.1;Value Chain;25
4.1.5.2;Internet Branding;26
4.1.5.3;Brand Transparency;26
4.1.5.4;Brand Transparency;26
4.1.5.5;Configurable Workflows;26
4.1.5.6;Data Integrity and Privacy;26
4.1.5.7;Anticipation of Customer Need;27
4.1.6;Responsive Operations;27
4.1.6.1;Order Management;27
4.1.6.2;Sourcing Strategy;28
4.1.6.3;Service Management;28
4.1.6.4;Transactional Alignment;28
4.1.6.5;Real-Time Reporting;28
4.1.7;Optimal Decision Making;29
4.1.7.1;Language-Based Decision Rules;30
4.1.7.2;Practice-Based Decision Rules;30
4.1.7.3;Practice-Based Decision Rules;31
4.1.7.4;Service-Based Decision Rules;31
4.1.8;Summary and Conclusions;31
4.1.8.1;More Applied Innovation;31
4.1.8.2;Architecture Innovation;32
4.1.8.3;XML Platform of Contracts;32
4.1.8.4;Front-Line Decision-Making;32
4.1.9;References;32
4.2;Development of the Next Generation CDMA Technology and Lessons We Learnt from the Past;37
4.2.1;Introduction;37
4.2.2;Review of Multiple Access Technologies;39
4.2.3;History in Development of CDMA Technology;41
4.2.4;Impact of CDMA IPR Issues;44
4.2.5;Problems with the Current CDMA Technology;45
4.2.6;Introduction of NG-CDMA Technology;47
4.2.6.1;REAL Approach;47
4.2.6.2;Multi-dimensional Spreading;49
4.2.7;Comparison of NG-CDMA and OFDMA Technologies;52
4.2.7.1;Technical Features for OFDMA;53
4.2.7.2;Technical Limitations for OFDMA;56
4.2.8;Conclusions;58
4.2.9;References;59
5;Part I ICE-B;61
5.1;Method for Classification of Unstructured Data in Telecommunication Services;62
5.1.1;Introduction;62
5.1.2;Data Analysis in Telecom Operations;63
5.1.2.1;Necessities of Data Classification and Text Mining;63
5.1.2.2;Limitations of Morphological Analysis;64
5.1.2.3;Limitations of Correspondence Analysis;64
5.1.3;Features of Textual Data in Telecom Services;66
5.1.4;Classification Method Based on Co-occurrence;67
5.1.4.1;Framework of Classification;67
5.1.4.2;Term Classification for Telecom Enquiries;67
5.1.4.3;Calculation Based on Co-occurrence;68
5.1.4.4;Transition of Relativity among Multiple Terms;69
5.1.5;Evaluation of Results;70
5.1.5.1;Co-occurrence in a Category;70
5.1.5.2;Co-occurrence among Categories;70
5.1.6;Conclusions;72
5.1.7;References;72
5.2;Possible Determinants Affecting the Use of Mobile Tourism Services;74
5.2.1;Introduction;74
5.2.2;Service Descriptions;75
5.2.3;Possible Determinants;75
5.2.3.1;Value;76
5.2.3.2;Ease of Use;77
5.2.3.3;Risk;77
5.2.3.4;Social Influence;78
5.2.3.5;Tourist Characteristics;78
5.2.4;The Field Trial Setup;79
5.2.5;The Participants;81
5.2.6;Experiences from the Trial;81
5.2.7;Discussion;82
5.2.7.1;Tourist Characteristics;83
5.2.7.2;Mobile and Service Value;83
5.2.7.3;Risk;83
5.2.7.4;Ease of Use;84
5.2.7.5;Social Influence;84
5.2.8;Conclusions;84
5.2.9;References;85
5.3;Towards a Version-Based Approach to Deal with Business Process Evolution;87
5.3.1;Introduction;87
5.3.2;Modelling Business Processes;89
5.3.3;Modelling Versions of Business Processes;91
5.3.3.1;Concept of Version;91
5.3.3.2;The Versioned Business Process Meta-model;92
5.3.4;Operations for Business Process Versioning;94
5.3.4.1;State Chart for Versions;95
5.3.4.2;Creating and Updating Versions;96
5.3.4.3;Derivation of Versions;96
5.3.4.4;Selection of Versions;97
5.3.5;Conclusions;98
5.3.6;References;99
5.4;Comparing Consumer Resistance to Mobile Banking in Finland and Portugal;102
5.4.1;Introduction;102
5.4.2;Penetration of Communications Technology;103
5.4.3;Adoption Barriers and Hypotheses;104
5.4.3.1;Usage Barrier;104
5.4.3.2;Value Barrier;104
5.4.3.3;Risk Barrier;105
5.4.3.4;Tradition Barrier;105
5.4.3.5;Image Barrier;105
5.4.3.6;Hypotheses Development;106
5.4.4;Data and Methods;107
5.4.5;Results;108
5.4.6;Conclusions and Future Research;109
5.4.7;References;110
5.5;NPTool: Towards Scalability and Reliability of Business Process Management;112
5.5.1;Introduction;112
5.5.2;Related Work;113
5.5.3;NavigationPlanTool;114
5.5.3.1;The Relational Data Structures Created by $NPDL Interpreter$;114
5.5.3.2;The Execution Control of Business Processes in NPTool;115
5.5.4;Example of Execution Control;120
5.5.5;Conclusions;124
5.5.6;References;124
5.6;In Search of Search Engine Marketing Strategy Amongst SME’s in Ireland;126
5.6.1;Introduction;126
5.6.2;Study Background;126
5.6.3;Research Methodology;128
5.6.4;Findings;129
5.6.4.1;Website Development;129
5.6.4.2;Nature of the SEM Strategy;129
5.6.4.3;Types of SEM Strategy Used by SMEs;130
5.6.4.4;SEO Strategy Techniques;130
5.6.4.5;Paid Search Strategy Techniques;131
5.6.4.6;Measuring SEM;132
5.6.4.7;Effectiveness of SEM Measurement;133
5.6.4.8;Ethics and SEM;134
5.6.4.9;Challenges in SEM;135
5.6.5;Conclusions;135
5.6.6;References;136
6;Part II SECRYPT;138
6.1;Integrating Anomaly-Based Approach into Bayesian Network Classifiers;139
6.1.1;Introduction;139
6.1.2;Bayesian Classifiers;140
6.1.3;Anomaly Detection;141
6.1.3.1;Novel Attacks’ Impact on Feature Sets;142
6.1.4;Why Standard Bayesian Classifiers Fail in Detecting Novel Attacks;143
6.1.5;Enhancing Standard Bayesian Classification Rule;144
6.1.5.1;Enhancing Bayesian Classification Rule to Exploit Normality/Abnormality Duality;144
6.1.5.2;Enhancing Bayesian Classification Rule to Exploit Zero Probabilities;145
6.1.5.3;Enhancing Bayesian Classification Rule to Exploit Likelihood of Unusual Attacks;146
6.1.6;Experimental Studies;147
6.1.6.1;Training and Testing Data Sets;147
6.1.6.2;Brief Description of Naive Bayes and TAN Classifiers;148
6.1.6.3;Standard vs Enhanced Bayesian Classification Rule on $http$ Traffic;148
6.1.7;Conclusions;150
6.1.8;References;150
6.2;Aggregation and Thresholding Schemes for Anomaly-Based Approaches;152
6.2.1;Introduction;152
6.2.2;Related Work;153
6.2.2.1;AnomalyMeasuring, Aggregating and Thresholding;153
6.2.2.2;Drawbacks of Existing Schemes for Anomaly Measuring, Aggregating and Thresholding;155
6.2.3;New Schemes for Anomaly Score Aggregating and Thresholding;156
6.2.3.1;What Is “Anomalous Behavior”;156
6.2.3.2;New Thresholding Schemes;157
6.2.3.3;Bayesian-Based Aggregation;158
6.2.4;Experimental Studies;159
6.2.4.1;DetectionModel Definition;159
6.2.4.2;Training and Testing Data;160
6.2.4.3;Comparison of Thresholding and Aggregation Schemes;161
6.2.4.4;Evaluation of Ranking-Based Thresholding;162
6.2.5;Conclusions;162
6.2.6;References;163
6.3;A Memory Efficient Network Encryption Scheme;165
6.3.1;Introduction;165
6.3.2;Current Schemes;166
6.3.2.1;General Assumptions;166
6.3.2.2;CBC-Pre;166
6.3.2.3;CBC-On;167
6.3.3;Proposed Scheme;167
6.3.3.1;Proposed Scheme Objectives;167
6.3.3.2;AES2S;168
6.3.3.3;Secondary Keys Generation;168
6.3.3.4;CBC-S$^{\it n}$;168
6.3.4;MemoryAnalysis;169
6.3.5;Simulation Analysis;170
6.3.5.1;Server Configuration;170
6.3.5.2;Parameters;170
6.3.5.3;The Scenarios;171
6.3.5.4;The Simulation Results;172
6.3.5.5;Discussion of the Results;173
6.3.6;Security Analysis;173
6.3.6.1;Security of CBC;173
6.3.6.2;Security of AES;174
6.3.6.3;Security of AES2S;174
6.3.6.4;Security of the Schemes;174
6.3.7;Conclusions;175
6.3.8;References;176
6.4;Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks;178
6.4.1;Introduction;178
6.4.2;Attacks over MANETs;179
6.4.3;PGP-Like;180
6.4.4;Metrics;183
6.4.5;Evaluation Results;184
6.4.5.1;Lack of Cooperation Attack;185
6.4.5.2;Impersonation Attacks;186
6.4.6;Conclusions and Future Work;189
6.4.7;References;190
6.5;Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes;192
6.5.1;Introduction;192
6.5.2;Previous Work in Multiphase Keying: RoK Approach;193
6.5.2.1;Node Configuration Phase;194
6.5.2.2;Key Establishment Phase;195
6.5.3;Comparison of Multiphase Keying and Basic Scheme;196
6.5.3.1;Self Healing;196
6.5.3.2;Resiliency against Continuous Attack;197
6.5.4;Proposed Schemes;197
6.5.4.1;DeploymentModels;198
6.5.4.2;Key Establishment Phase;201
6.5.4.3;Performance Evaluation;201
6.5.5;Discussions;206
6.5.5.1;Connectivity versus Resiliency Tradeoff;207
6.5.5.2;Dynamic Lifetimes of Key Rings andWasted Non-captured Nodes;207
6.5.6;Related Work;207
6.5.7;Conclusions;208
6.5.8;References;209
6.6;Reducing Memory Requirements for Combinatorial Attacks on NTRU via Multiple Birthdays;211
6.6.1;Introduction;211
6.6.1.1;Our Contribution;211
6.6.1.2;RelatedWork;212
6.6.1.3;Organization;212
6.6.2;Preliminaries;212
6.6.3;The Generalized Birthday Paradox;213
6.6.4;A Multiple Birthday Attack for NTRU;214
6.6.4.1;An Approach with Symmetric Sets;215
6.6.4.2;Experimental Results;218
6.6.4.3;Comparison with Other Attacks;218
6.6.5;Conclusions;219
6.6.5.1;Open Questions;219
6.6.6;References;219
6.6.7;Appendix;220
6.7;On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority;222
6.7.1;Introduction;222
6.7.2;Basic Notions;223
6.7.2.1;Goals;223
6.7.2.2;Security Properties;224
6.7.2.3;Players and Trust Assumptions;224
6.7.3;Ibrahim $et al.’s$ Protocols;224
6.7.3.1;Protocol in IAS 2007;226
6.7.3.2;Protocol in SECRYPT 2007;228
6.7.4;Our Analysis;228
6.7.4.1;Definition;229
6.7.4.2;Attacks;229
6.7.4.3;Williams-Treharne-Ho Analysis of the Protocols;231
6.7.4.4;Deng-Preneel Analysis of the Protocols;231
6.7.4.5;Comments;232
6.7.5;Conclusions;233
6.7.6;References;234
6.8;RKRD: Runtime Kernel Rootkit Detection;236
6.8.1;Introduction;236
6.8.2;Design Principles;237
6.8.3;Assumptions and Threat Model;238
6.8.4;System Architecture;240
6.8.5;Prototype;242
6.8.6;Performance;244
6.8.7;Threat Analysis;246
6.8.8;Related Work;247
6.8.9;Concluding Remarks;248
6.8.10;References;248
6.9;A New Narrow-Block Mode of Operation for Disk Encryption with Error Propagation;249
6.9.1;Introduction;249
6.9.2;Disk Encryption;250
6.9.2.1;Disk Encryption Constraints;250
6.9.2.2;General Scheme and Tweak Calculation;250
6.9.3;Current Modes of Operations;251
6.9.3.1;Terminologies;251
6.9.3.2;CBC: Cipher Block Chaining;251
6.9.3.3;CFB: Cipher Feedback;252
6.9.4;ProposedMode;252
6.9.4.1;Goals;252
6.9.4.2;Keys;253
6.9.4.3;Design;253
6.9.4.4;Discussion of SCC Mode;254
6.9.4.5;Pros of SCC;255
6.9.4.6;Security of SCC;255
6.9.5;Performance Analysis;256
6.9.5.1;Operational Time;256
6.9.5.2;Parallel Implementation;256
6.9.6;Elephant;256
6.9.6.1;The Diffusers;257
6.9.6.2;ProposedModification;258
6.9.6.3;Bit Dependency Tests;258
6.9.7;Performance;259
6.9.8;Conclusions;260
6.9.9;References;260
6.10;Security Requirements Management in Software Product Line Engineering;262
6.10.1;Introduction;262
6.10.2;SREPPLine;263
6.10.2.1;Security Requirements Variability Management;265
6.10.2.2;Product Line Security Domain Requirements Engineering Sub-process;269
6.10.2.3;Product Line Security Application Requirements Engineering Sub-process;271
6.10.3;Related Work;272
6.10.4;Conclusions and Further Work;273
6.10.5;References;274
7;Part III SIGMAP;276
7.1;On the Suitability of Suffix Arrays for Lempel-Ziv Data Compression;277
7.1.1;Introduction;277
7.1.2;LZ77 and LZSS Compression;278
7.1.2.1;Decoding;279
7.1.3;Suffix Trees for LZ77 Compression;279
7.1.3.1;Encoding Using Suffix Trees;280
7.1.4;Suffix Arrays for LZ77 Compression;281
7.1.4.1;Encoding Using Suffix Arrays;282
7.1.5;Implementation Details;283
7.1.6;Experimental Results;284
7.1.6.1;Encoding Time, Memory and Compression Ratio;285
7.1.6.2;Encoding Time and Memory Analysis;287
7.1.7;Conclusions and Future Work;288
7.1.8;References;289
7.2;Iteratively Detected MIMO-OFDM Twisted-Pair Transmission Schemes;291
7.2.1;Introduction;291
7.2.2;Cable Characteristics;292
7.2.3;MIMO-OFDM System Model and Quality Criteria;293
7.2.4;Coded MIMO-OFDM System;296
7.2.5;Results;297
7.2.5.1;Uncoded System;298
7.2.5.2;Coded System;299
7.2.6;Conclusions;302
7.2.7;Outlook;302
7.2.8;References;302
7.3;Whales Localization Using a Large Hydrophone Array: Performance Relative to Cramer-Rao Bounds and Confidence Regions;304
7.3.1;Introduction;304
7.3.2;Problem Formulation;305
7.3.2.1;Material;306
7.3.2.2;Signal Filtering;306
7.3.2.3;Rough $\~{\it T}$ Estimation;308
7.3.2.4;$\~{\it T}$ Selection;308
7.3.2.5;Localization with a Linear Profile;308
7.3.3;The CRLB and the Confidence Regions;309
7.3.3.1;The CRLB;309
7.3.3.2;Confidence Regions;310
7.3.4;Results;310
7.3.4.1;Tracking Comparisons;310
7.3.4.2;CRLB Computation;310
7.3.4.3;The Confidence Regions;313
7.3.4.4;Performance Comparisons;315
7.3.5;Conclusions;315
7.3.6;References;315
7.4;Automatic Recognition of Isolated Vowels Using F0-Normalized Harmonic Features;317
7.4.1;Introduction;317
7.4.2;The Perceptual Spectral Cluster Concept;319
7.4.2.1;Estimation of PSCs;319
7.4.2.2;PSC Features;320
7.4.2.3;F0-Normalized PSC Features;322
7.4.3;Automatic Recognition Tests;323
7.4.4;Training and Testing Data Base;324
7.4.5;Results and Discussion;324
7.4.6;Conclusions;326
7.4.7;References;326
7.5;High-Speed Configurable VLSI Architecture of a General Purpose Lifting-Based Discrete Wavelet Processor;328
7.5.1;Introduction;328
7.5.2;Lifting Scheme;330
7.5.3;Proposed Architecture;331
7.5.3.1;Architecture of the Processing Element;332
7.5.3.2;Normalization;332
7.5.3.3;Context Controller;333
7.5.3.4;Processor and Its Memory Controller;334
7.5.4;Results and Performances;337
7.5.5;Conclusions;339
7.5.6;References;340
7.6;Face Detection Using Discrete Gabor Jets and a Probabilistic Model of Colored Image Patches;341
7.6.1;Introduction;341
7.6.2;Face Detection Using Discrete Gabor Jets;343
7.6.2.1;Feature Extraction I: Discrete Gabor Jets;343
7.6.2.2;Feature Extraction II: Modified Linear Discriminant Analysis;345
7.6.2.3;Classification and Postprocessing;346
7.6.3;Face Detection Using Color Information;347
7.6.3.1;Modeling Skin Color and Other Colors;347
7.6.3.2;Modeling Colored Image Patches;348
7.6.3.3;Learning Parameters of Image Patch Model;349
7.6.3.4;Face Detection Using the Image Patch Model;349
7.6.4;Combining Discrete Gabor Jets and Color Information;350
7.6.5;Results;350
7.6.6;Conclusions;353
7.6.7;References;353
7.7;Geometric Distortion Resilient Watermarking Based on a Single Robust Feature for Still Images;355
7.7.1;Introduction;355
7.7.2;Invariant Direction;357
7.7.2.1;Image Pre-processing;357
7.7.2.2;Invariant Direction ExtractionMethod;358
7.7.3;Embedding and Detection;359
7.7.4;Results;361
7.7.4.1;Effectiveness of Direction Extraction;361
7.7.4.2;Imperceptibility;362
7.7.4.3;Robustness;364
7.7.5;Conclusions;366
7.7.6;References;366
7.8;Optimized Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware;368
7.8.1;Introduction;368
7.8.2;System Architecture;369
7.8.2.1;Preprocessing;370
7.8.2.2;View Interpolation;371
7.8.2.3;Depth Refinement;372
7.8.2.4;Recoloring;374
7.8.2.5;Movement Analysis;375
7.8.2.6;Concurrent Eye Tracking;375
7.8.2.7;Networking;376
7.8.3;Optimizations;376
7.8.3.1;Improved Arithmetic Intensity;377
7.8.3.2;Acceleration by Elevated Granularity;377
7.8.3.3;Dynamic GPU Programming;378
7.8.4;Results;378
7.8.5;Conclusions;380
7.8.6;Future Work;381
7.8.7;References;381
7.9;A New IMS Based Inter-working Solution;383
7.9.1;Introduction;383
7.9.2;Multimedia Inter-working Service;384
7.9.3;Technical Description;385
7.9.3.1;Logic Flows;386
7.9.3.2;Mapping Rules;387
7.9.3.3;Use Case Discussion;388
7.9.4;Comparison;391
7.9.5;Summary;392
7.9.6;References;393
7.10;Quality Evaluation of Reverberation in Audioband Speech Signals;394
7.10.1;Introduction;394
7.10.2;Reverberation Definition;395
7.10.3;Reverberation Modeling;396
7.10.3.1;Early Reflections via Image Method;396
7.10.3.2;Schroeder’s Late Reverberator;397
7.10.3.3;Feedback Delay Networks (FDN);398
7.10.3.4;Gardner’s Late Reverberator;399
7.10.3.5;Gardner’sModified Full Reverberator;399
7.10.4;Subjective Evaluation of Reverberation;400
7.10.4.1;Test Specification;400
7.10.4.2;Test Results;401
7.10.5;Objective Evaluation of Reverberation;402
7.10.5.1;Standard Quality Assessment Methods;402
7.10.5.2;Articulation Loss of Consonants;403
7.10.6;Conclusions;405
7.10.7;References;405
8;Part IV WINSYS;407
8.1;Conservative Transmit Power Control Mechanism for 802.11 Mesh;408
8.1.1;Introduction;408
8.1.2;Related Work;409
8.1.3;Conservative Transmit Power Control (ConTPC);410
8.1.4;ConTPC Implementation Details;411
8.1.5;Experimental Setup;412
8.1.6;Results;413
8.1.6.1;Delivery Ratio vs. SNR;413
8.1.6.2;Disjoint Case;414
8.1.6.3;Eleven Nodes Testbed Case;416
8.1.6.4;Stability of ConTPC;416
8.1.6.5;Overhead of ConTPC;417
8.1.6.6;ConTPC Parameters Evaluation;418
8.1.7;Conclusions;419
8.1.8;References;419
8.2;Multiple Mobile Sinks Deployment for Energy Efficiency in Large Scale Wireless Sensor Networks;421
8.2.1;Introduction;421
8.2.2;Design Parameters in Energy Constrained WSNs: Description and Related Work;422
8.2.2.1;Network Architecture for WSNs;422
8.2.2.2;Nodes Deployment;424
8.2.2.3;Energy Model;424
8.2.2.4;Single Hop vs. Multi Hop;425
8.2.2.5;Multiple Mobile Sinks;426
8.2.2.6;Overhead Problem;428
8.2.2.7;Buffering Data;428
8.2.2.8;Transmission Range Influence;429
8.2.3;Multiple Sinks Placement in Large Scale WSNs: Proposed Approach;429
8.2.3.1;Existing Graph Partitioning Techniques;430
8.2.3.2;Model Formulation;430
8.2.3.3;Problem Resolution;431
8.2.4;Simulation Results and Analysis;431
8.2.5;Conclusion and Future Work;434
8.2.6;References;435
8.3;Using Vegetation Barriers to Improving Wireless Network Isolation and Security;437
8.3.1;Introduction;437
8.3.2;Measurements;438
8.3.2.1;Measurement Setup;439
8.3.2.2;Measurement Procedure;439
8.3.2.3;Vegetation Species;441
8.3.3;Analysis of the Results;441
8.3.3.1;Attenuation Due to the Vegetation Lines;442
8.3.3.2;Variability with Time;444
8.3.3.3;Application to Interference Mitigation;444
8.3.3.4;Application to Protection against External Attacks;445
8.3.4;Conclusions;446
8.3.5;References;447
8.4;Throughput Maximization for Multiband-OFDM Ultra Wideband Systems with Adaptive Frame Length Control;448
8.4.1;Introduction;448
8.4.2;WiMedia MAC and PHY Protocol Overview;450
8.4.2.1;WiMedia MB-OFDM PHY;450
8.4.2.2;WiMedia MAC;451
8.4.3;Throughput Analysis and Frame Length Optimization;453
8.4.3.1;AnalyticalModel;453
8.4.3.2;Throughput;455
8.4.3.3;Frame Length Optimization Design;456
8.4.4;Numerical Results;457
8.4.5;Conclusions;459
8.4.6;References;460
8.5;Evaluation of Multicast Scheduling and Clustering Schemes with Packet-Level Macro Diversity in High-Speed Cellular Networks;462
8.5.1;Introduction;462
8.5.2;Model Description;464
8.5.2.1;General Considerations;464
8.5.2.2;PropagationModel;464
8.5.3;Proposed Clustering Strategy;465
8.5.4;Multicast Scheduling;466
8.5.4.1;EB Scheduler;467
8.5.4.2;Max-SNR Scheduler;467
8.5.4.3;WFQ-RR;468
8.5.4.4;Generic System Context;468
8.5.5;Multicast Scheduling with SC;469
8.5.5.1;EB with SC;469
8.5.5.2;Max-SNR with SC;469
8.5.5.3;WFQ-RR with SC;470
8.5.6;Multicast Scheduling with MRC;470
8.5.6.1;EB with MRC;471
8.5.6.2;Max-SNR with MRC;471
8.5.6.3;WFQ-RR with MRC;472
8.5.7;Evaluation Results;472
8.5.8;Conclusions;474
8.5.9;References;474
8.6;The Service Distribution Protocol for MANETs - Criteria and Performance Analysis;476
8.6.1;Introduction;476
8.6.2;Overview on the Service Distribution Protocol for MANETs;478
8.6.2.1;ReplicationMechanism;478
8.6.2.2;HibernationMechanism;479
8.6.2.3;Service Caching;479
8.6.3;Network Model;479
8.6.3.1;Mobility Model;480
8.6.3.2;Service Model;480
8.6.3.3;Calling Model;480
8.6.4;Simulation and Discussions;480
8.6.4.1;Configurations;481
8.6.4.2;Performance Analysis;481
8.6.4.3;Extended Performance Analysis;484
8.6.5;Related Work;486
8.6.6;Conclusions;487
8.6.7;References;487
9;Author Index;489




