Filipe / Obaidat | e-Business and Telecommunications | E-Book | www2.sack.de
E-Book

E-Book, Englisch, Band 48, 490 Seiten

Reihe: Communications in Computer and Information Science

Filipe / Obaidat e-Business and Telecommunications

International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers
1. Auflage 2009
ISBN: 978-3-642-05197-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers

E-Book, Englisch, Band 48, 490 Seiten

Reihe: Communications in Computer and Information Science

ISBN: 978-3-642-05197-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book contains the best papers of the 5th International Conference on e-Business and Telecommunications, ICETE, which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and telecommunications. ICETE is a joint international conference integrating four major areas of knowledge that are divided into four corresponding conferences: ICE-B (International Conference on e-Business), SECRYPT (International Conference on Security and Cryptography), SIGMAP (International Conference on Signal Processing and Multimedia), and WINSYS (International Conferenceon Wireless Information Systems).

Filipe / Obaidat e-Business and Telecommunications jetzt bestellen!

Weitere Infos & Material


1;Preface;5
2;Organization;6
3;Table of Contents;13
4;Invited Speakers;17
4.1;e-Business Innovation: The Next Decade;18
4.1.1;Demographic Cycles;18
4.1.1.1;The Next Decade;18
4.1.1.2;The Birth Cycle;19
4.1.1.3;The Spending Cycle;19
4.1.1.4;The Economic Cycle;19
4.1.2;Technology Cycles;20
4.1.2.1;The 80-Year Cycle;20
4.1.2.2;The Internet S-Curve;21
4.1.2.3;The Wireless S-Curve;21
4.1.2.4;The Broadband S-Curve;21
4.1.3;Context Aware e-Business;21
4.1.3.1;Arrival of Mass Affluence;22
4.1.3.2;Premium Market Growth;22
4.1.3.3;Old Culture Scrutinized;22
4.1.3.4;Corporate Power Shifts;23
4.1.3.5;New Management Model;23
4.1.4;Customer-Based Organization;23
4.1.4.1;End-to-End Transaction;24
4.1.4.2;Customer-based Business Design;24
4.1.4.3;Business Replication by Market;24
4.1.4.4;Full Service Response;24
4.1.4.5;Browsers and Butlers;24
4.1.5;Adaptive Solutions;25
4.1.5.1;Value Chain;25
4.1.5.2;Internet Branding;26
4.1.5.3;Brand Transparency;26
4.1.5.4;Brand Transparency;26
4.1.5.5;Configurable Workflows;26
4.1.5.6;Data Integrity and Privacy;26
4.1.5.7;Anticipation of Customer Need;27
4.1.6;Responsive Operations;27
4.1.6.1;Order Management;27
4.1.6.2;Sourcing Strategy;28
4.1.6.3;Service Management;28
4.1.6.4;Transactional Alignment;28
4.1.6.5;Real-Time Reporting;28
4.1.7;Optimal Decision Making;29
4.1.7.1;Language-Based Decision Rules;30
4.1.7.2;Practice-Based Decision Rules;30
4.1.7.3;Practice-Based Decision Rules;31
4.1.7.4;Service-Based Decision Rules;31
4.1.8;Summary and Conclusions;31
4.1.8.1;More Applied Innovation;31
4.1.8.2;Architecture Innovation;32
4.1.8.3;XML Platform of Contracts;32
4.1.8.4;Front-Line Decision-Making;32
4.1.9;References;32
4.2;Development of the Next Generation CDMA Technology and Lessons We Learnt from the Past;37
4.2.1;Introduction;37
4.2.2;Review of Multiple Access Technologies;39
4.2.3;History in Development of CDMA Technology;41
4.2.4;Impact of CDMA IPR Issues;44
4.2.5;Problems with the Current CDMA Technology;45
4.2.6;Introduction of NG-CDMA Technology;47
4.2.6.1;REAL Approach;47
4.2.6.2;Multi-dimensional Spreading;49
4.2.7;Comparison of NG-CDMA and OFDMA Technologies;52
4.2.7.1;Technical Features for OFDMA;53
4.2.7.2;Technical Limitations for OFDMA;56
4.2.8;Conclusions;58
4.2.9;References;59
5;Part I ICE-B;61
5.1;Method for Classification of Unstructured Data in Telecommunication Services;62
5.1.1;Introduction;62
5.1.2;Data Analysis in Telecom Operations;63
5.1.2.1;Necessities of Data Classification and Text Mining;63
5.1.2.2;Limitations of Morphological Analysis;64
5.1.2.3;Limitations of Correspondence Analysis;64
5.1.3;Features of Textual Data in Telecom Services;66
5.1.4;Classification Method Based on Co-occurrence;67
5.1.4.1;Framework of Classification;67
5.1.4.2;Term Classification for Telecom Enquiries;67
5.1.4.3;Calculation Based on Co-occurrence;68
5.1.4.4;Transition of Relativity among Multiple Terms;69
5.1.5;Evaluation of Results;70
5.1.5.1;Co-occurrence in a Category;70
5.1.5.2;Co-occurrence among Categories;70
5.1.6;Conclusions;72
5.1.7;References;72
5.2;Possible Determinants Affecting the Use of Mobile Tourism Services;74
5.2.1;Introduction;74
5.2.2;Service Descriptions;75
5.2.3;Possible Determinants;75
5.2.3.1;Value;76
5.2.3.2;Ease of Use;77
5.2.3.3;Risk;77
5.2.3.4;Social Influence;78
5.2.3.5;Tourist Characteristics;78
5.2.4;The Field Trial Setup;79
5.2.5;The Participants;81
5.2.6;Experiences from the Trial;81
5.2.7;Discussion;82
5.2.7.1;Tourist Characteristics;83
5.2.7.2;Mobile and Service Value;83
5.2.7.3;Risk;83
5.2.7.4;Ease of Use;84
5.2.7.5;Social Influence;84
5.2.8;Conclusions;84
5.2.9;References;85
5.3;Towards a Version-Based Approach to Deal with Business Process Evolution;87
5.3.1;Introduction;87
5.3.2;Modelling Business Processes;89
5.3.3;Modelling Versions of Business Processes;91
5.3.3.1;Concept of Version;91
5.3.3.2;The Versioned Business Process Meta-model;92
5.3.4;Operations for Business Process Versioning;94
5.3.4.1;State Chart for Versions;95
5.3.4.2;Creating and Updating Versions;96
5.3.4.3;Derivation of Versions;96
5.3.4.4;Selection of Versions;97
5.3.5;Conclusions;98
5.3.6;References;99
5.4;Comparing Consumer Resistance to Mobile Banking in Finland and Portugal;102
5.4.1;Introduction;102
5.4.2;Penetration of Communications Technology;103
5.4.3;Adoption Barriers and Hypotheses;104
5.4.3.1;Usage Barrier;104
5.4.3.2;Value Barrier;104
5.4.3.3;Risk Barrier;105
5.4.3.4;Tradition Barrier;105
5.4.3.5;Image Barrier;105
5.4.3.6;Hypotheses Development;106
5.4.4;Data and Methods;107
5.4.5;Results;108
5.4.6;Conclusions and Future Research;109
5.4.7;References;110
5.5;NPTool: Towards Scalability and Reliability of Business Process Management;112
5.5.1;Introduction;112
5.5.2;Related Work;113
5.5.3;NavigationPlanTool;114
5.5.3.1;The Relational Data Structures Created by $NPDL Interpreter$;114
5.5.3.2;The Execution Control of Business Processes in NPTool;115
5.5.4;Example of Execution Control;120
5.5.5;Conclusions;124
5.5.6;References;124
5.6;In Search of Search Engine Marketing Strategy Amongst SME’s in Ireland;126
5.6.1;Introduction;126
5.6.2;Study Background;126
5.6.3;Research Methodology;128
5.6.4;Findings;129
5.6.4.1;Website Development;129
5.6.4.2;Nature of the SEM Strategy;129
5.6.4.3;Types of SEM Strategy Used by SMEs;130
5.6.4.4;SEO Strategy Techniques;130
5.6.4.5;Paid Search Strategy Techniques;131
5.6.4.6;Measuring SEM;132
5.6.4.7;Effectiveness of SEM Measurement;133
5.6.4.8;Ethics and SEM;134
5.6.4.9;Challenges in SEM;135
5.6.5;Conclusions;135
5.6.6;References;136
6;Part II SECRYPT;138
6.1;Integrating Anomaly-Based Approach into Bayesian Network Classifiers;139
6.1.1;Introduction;139
6.1.2;Bayesian Classifiers;140
6.1.3;Anomaly Detection;141
6.1.3.1;Novel Attacks’ Impact on Feature Sets;142
6.1.4;Why Standard Bayesian Classifiers Fail in Detecting Novel Attacks;143
6.1.5;Enhancing Standard Bayesian Classification Rule;144
6.1.5.1;Enhancing Bayesian Classification Rule to Exploit Normality/Abnormality Duality;144
6.1.5.2;Enhancing Bayesian Classification Rule to Exploit Zero Probabilities;145
6.1.5.3;Enhancing Bayesian Classification Rule to Exploit Likelihood of Unusual Attacks;146
6.1.6;Experimental Studies;147
6.1.6.1;Training and Testing Data Sets;147
6.1.6.2;Brief Description of Naive Bayes and TAN Classifiers;148
6.1.6.3;Standard vs Enhanced Bayesian Classification Rule on $http$ Traffic;148
6.1.7;Conclusions;150
6.1.8;References;150
6.2;Aggregation and Thresholding Schemes for Anomaly-Based Approaches;152
6.2.1;Introduction;152
6.2.2;Related Work;153
6.2.2.1;AnomalyMeasuring, Aggregating and Thresholding;153
6.2.2.2;Drawbacks of Existing Schemes for Anomaly Measuring, Aggregating and Thresholding;155
6.2.3;New Schemes for Anomaly Score Aggregating and Thresholding;156
6.2.3.1;What Is “Anomalous Behavior”;156
6.2.3.2;New Thresholding Schemes;157
6.2.3.3;Bayesian-Based Aggregation;158
6.2.4;Experimental Studies;159
6.2.4.1;DetectionModel Definition;159
6.2.4.2;Training and Testing Data;160
6.2.4.3;Comparison of Thresholding and Aggregation Schemes;161
6.2.4.4;Evaluation of Ranking-Based Thresholding;162
6.2.5;Conclusions;162
6.2.6;References;163
6.3;A Memory Efficient Network Encryption Scheme;165
6.3.1;Introduction;165
6.3.2;Current Schemes;166
6.3.2.1;General Assumptions;166
6.3.2.2;CBC-Pre;166
6.3.2.3;CBC-On;167
6.3.3;Proposed Scheme;167
6.3.3.1;Proposed Scheme Objectives;167
6.3.3.2;AES2S;168
6.3.3.3;Secondary Keys Generation;168
6.3.3.4;CBC-S$^{\it n}$;168
6.3.4;MemoryAnalysis;169
6.3.5;Simulation Analysis;170
6.3.5.1;Server Configuration;170
6.3.5.2;Parameters;170
6.3.5.3;The Scenarios;171
6.3.5.4;The Simulation Results;172
6.3.5.5;Discussion of the Results;173
6.3.6;Security Analysis;173
6.3.6.1;Security of CBC;173
6.3.6.2;Security of AES;174
6.3.6.3;Security of AES2S;174
6.3.6.4;Security of the Schemes;174
6.3.7;Conclusions;175
6.3.8;References;176
6.4;Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks;178
6.4.1;Introduction;178
6.4.2;Attacks over MANETs;179
6.4.3;PGP-Like;180
6.4.4;Metrics;183
6.4.5;Evaluation Results;184
6.4.5.1;Lack of Cooperation Attack;185
6.4.5.2;Impersonation Attacks;186
6.4.6;Conclusions and Future Work;189
6.4.7;References;190
6.5;Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes;192
6.5.1;Introduction;192
6.5.2;Previous Work in Multiphase Keying: RoK Approach;193
6.5.2.1;Node Configuration Phase;194
6.5.2.2;Key Establishment Phase;195
6.5.3;Comparison of Multiphase Keying and Basic Scheme;196
6.5.3.1;Self Healing;196
6.5.3.2;Resiliency against Continuous Attack;197
6.5.4;Proposed Schemes;197
6.5.4.1;DeploymentModels;198
6.5.4.2;Key Establishment Phase;201
6.5.4.3;Performance Evaluation;201
6.5.5;Discussions;206
6.5.5.1;Connectivity versus Resiliency Tradeoff;207
6.5.5.2;Dynamic Lifetimes of Key Rings andWasted Non-captured Nodes;207
6.5.6;Related Work;207
6.5.7;Conclusions;208
6.5.8;References;209
6.6;Reducing Memory Requirements for Combinatorial Attacks on NTRU via Multiple Birthdays;211
6.6.1;Introduction;211
6.6.1.1;Our Contribution;211
6.6.1.2;RelatedWork;212
6.6.1.3;Organization;212
6.6.2;Preliminaries;212
6.6.3;The Generalized Birthday Paradox;213
6.6.4;A Multiple Birthday Attack for NTRU;214
6.6.4.1;An Approach with Symmetric Sets;215
6.6.4.2;Experimental Results;218
6.6.4.3;Comparison with Other Attacks;218
6.6.5;Conclusions;219
6.6.5.1;Open Questions;219
6.6.6;References;219
6.6.7;Appendix;220
6.7;On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority;222
6.7.1;Introduction;222
6.7.2;Basic Notions;223
6.7.2.1;Goals;223
6.7.2.2;Security Properties;224
6.7.2.3;Players and Trust Assumptions;224
6.7.3;Ibrahim $et al.’s$ Protocols;224
6.7.3.1;Protocol in IAS 2007;226
6.7.3.2;Protocol in SECRYPT 2007;228
6.7.4;Our Analysis;228
6.7.4.1;Definition;229
6.7.4.2;Attacks;229
6.7.4.3;Williams-Treharne-Ho Analysis of the Protocols;231
6.7.4.4;Deng-Preneel Analysis of the Protocols;231
6.7.4.5;Comments;232
6.7.5;Conclusions;233
6.7.6;References;234
6.8;RKRD: Runtime Kernel Rootkit Detection;236
6.8.1;Introduction;236
6.8.2;Design Principles;237
6.8.3;Assumptions and Threat Model;238
6.8.4;System Architecture;240
6.8.5;Prototype;242
6.8.6;Performance;244
6.8.7;Threat Analysis;246
6.8.8;Related Work;247
6.8.9;Concluding Remarks;248
6.8.10;References;248
6.9;A New Narrow-Block Mode of Operation for Disk Encryption with Error Propagation;249
6.9.1;Introduction;249
6.9.2;Disk Encryption;250
6.9.2.1;Disk Encryption Constraints;250
6.9.2.2;General Scheme and Tweak Calculation;250
6.9.3;Current Modes of Operations;251
6.9.3.1;Terminologies;251
6.9.3.2;CBC: Cipher Block Chaining;251
6.9.3.3;CFB: Cipher Feedback;252
6.9.4;ProposedMode;252
6.9.4.1;Goals;252
6.9.4.2;Keys;253
6.9.4.3;Design;253
6.9.4.4;Discussion of SCC Mode;254
6.9.4.5;Pros of SCC;255
6.9.4.6;Security of SCC;255
6.9.5;Performance Analysis;256
6.9.5.1;Operational Time;256
6.9.5.2;Parallel Implementation;256
6.9.6;Elephant;256
6.9.6.1;The Diffusers;257
6.9.6.2;ProposedModification;258
6.9.6.3;Bit Dependency Tests;258
6.9.7;Performance;259
6.9.8;Conclusions;260
6.9.9;References;260
6.10;Security Requirements Management in Software Product Line Engineering;262
6.10.1;Introduction;262
6.10.2;SREPPLine;263
6.10.2.1;Security Requirements Variability Management;265
6.10.2.2;Product Line Security Domain Requirements Engineering Sub-process;269
6.10.2.3;Product Line Security Application Requirements Engineering Sub-process;271
6.10.3;Related Work;272
6.10.4;Conclusions and Further Work;273
6.10.5;References;274
7;Part III SIGMAP;276
7.1;On the Suitability of Suffix Arrays for Lempel-Ziv Data Compression;277
7.1.1;Introduction;277
7.1.2;LZ77 and LZSS Compression;278
7.1.2.1;Decoding;279
7.1.3;Suffix Trees for LZ77 Compression;279
7.1.3.1;Encoding Using Suffix Trees;280
7.1.4;Suffix Arrays for LZ77 Compression;281
7.1.4.1;Encoding Using Suffix Arrays;282
7.1.5;Implementation Details;283
7.1.6;Experimental Results;284
7.1.6.1;Encoding Time, Memory and Compression Ratio;285
7.1.6.2;Encoding Time and Memory Analysis;287
7.1.7;Conclusions and Future Work;288
7.1.8;References;289
7.2;Iteratively Detected MIMO-OFDM Twisted-Pair Transmission Schemes;291
7.2.1;Introduction;291
7.2.2;Cable Characteristics;292
7.2.3;MIMO-OFDM System Model and Quality Criteria;293
7.2.4;Coded MIMO-OFDM System;296
7.2.5;Results;297
7.2.5.1;Uncoded System;298
7.2.5.2;Coded System;299
7.2.6;Conclusions;302
7.2.7;Outlook;302
7.2.8;References;302
7.3;Whales Localization Using a Large Hydrophone Array: Performance Relative to Cramer-Rao Bounds and Confidence Regions;304
7.3.1;Introduction;304
7.3.2;Problem Formulation;305
7.3.2.1;Material;306
7.3.2.2;Signal Filtering;306
7.3.2.3;Rough $\~{\it T}$ Estimation;308
7.3.2.4;$\~{\it T}$ Selection;308
7.3.2.5;Localization with a Linear Profile;308
7.3.3;The CRLB and the Confidence Regions;309
7.3.3.1;The CRLB;309
7.3.3.2;Confidence Regions;310
7.3.4;Results;310
7.3.4.1;Tracking Comparisons;310
7.3.4.2;CRLB Computation;310
7.3.4.3;The Confidence Regions;313
7.3.4.4;Performance Comparisons;315
7.3.5;Conclusions;315
7.3.6;References;315
7.4;Automatic Recognition of Isolated Vowels Using F0-Normalized Harmonic Features;317
7.4.1;Introduction;317
7.4.2;The Perceptual Spectral Cluster Concept;319
7.4.2.1;Estimation of PSCs;319
7.4.2.2;PSC Features;320
7.4.2.3;F0-Normalized PSC Features;322
7.4.3;Automatic Recognition Tests;323
7.4.4;Training and Testing Data Base;324
7.4.5;Results and Discussion;324
7.4.6;Conclusions;326
7.4.7;References;326
7.5;High-Speed Configurable VLSI Architecture of a General Purpose Lifting-Based Discrete Wavelet Processor;328
7.5.1;Introduction;328
7.5.2;Lifting Scheme;330
7.5.3;Proposed Architecture;331
7.5.3.1;Architecture of the Processing Element;332
7.5.3.2;Normalization;332
7.5.3.3;Context Controller;333
7.5.3.4;Processor and Its Memory Controller;334
7.5.4;Results and Performances;337
7.5.5;Conclusions;339
7.5.6;References;340
7.6;Face Detection Using Discrete Gabor Jets and a Probabilistic Model of Colored Image Patches;341
7.6.1;Introduction;341
7.6.2;Face Detection Using Discrete Gabor Jets;343
7.6.2.1;Feature Extraction I: Discrete Gabor Jets;343
7.6.2.2;Feature Extraction II: Modified Linear Discriminant Analysis;345
7.6.2.3;Classification and Postprocessing;346
7.6.3;Face Detection Using Color Information;347
7.6.3.1;Modeling Skin Color and Other Colors;347
7.6.3.2;Modeling Colored Image Patches;348
7.6.3.3;Learning Parameters of Image Patch Model;349
7.6.3.4;Face Detection Using the Image Patch Model;349
7.6.4;Combining Discrete Gabor Jets and Color Information;350
7.6.5;Results;350
7.6.6;Conclusions;353
7.6.7;References;353
7.7;Geometric Distortion Resilient Watermarking Based on a Single Robust Feature for Still Images;355
7.7.1;Introduction;355
7.7.2;Invariant Direction;357
7.7.2.1;Image Pre-processing;357
7.7.2.2;Invariant Direction ExtractionMethod;358
7.7.3;Embedding and Detection;359
7.7.4;Results;361
7.7.4.1;Effectiveness of Direction Extraction;361
7.7.4.2;Imperceptibility;362
7.7.4.3;Robustness;364
7.7.5;Conclusions;366
7.7.6;References;366
7.8;Optimized Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware;368
7.8.1;Introduction;368
7.8.2;System Architecture;369
7.8.2.1;Preprocessing;370
7.8.2.2;View Interpolation;371
7.8.2.3;Depth Refinement;372
7.8.2.4;Recoloring;374
7.8.2.5;Movement Analysis;375
7.8.2.6;Concurrent Eye Tracking;375
7.8.2.7;Networking;376
7.8.3;Optimizations;376
7.8.3.1;Improved Arithmetic Intensity;377
7.8.3.2;Acceleration by Elevated Granularity;377
7.8.3.3;Dynamic GPU Programming;378
7.8.4;Results;378
7.8.5;Conclusions;380
7.8.6;Future Work;381
7.8.7;References;381
7.9;A New IMS Based Inter-working Solution;383
7.9.1;Introduction;383
7.9.2;Multimedia Inter-working Service;384
7.9.3;Technical Description;385
7.9.3.1;Logic Flows;386
7.9.3.2;Mapping Rules;387
7.9.3.3;Use Case Discussion;388
7.9.4;Comparison;391
7.9.5;Summary;392
7.9.6;References;393
7.10;Quality Evaluation of Reverberation in Audioband Speech Signals;394
7.10.1;Introduction;394
7.10.2;Reverberation Definition;395
7.10.3;Reverberation Modeling;396
7.10.3.1;Early Reflections via Image Method;396
7.10.3.2;Schroeder’s Late Reverberator;397
7.10.3.3;Feedback Delay Networks (FDN);398
7.10.3.4;Gardner’s Late Reverberator;399
7.10.3.5;Gardner’sModified Full Reverberator;399
7.10.4;Subjective Evaluation of Reverberation;400
7.10.4.1;Test Specification;400
7.10.4.2;Test Results;401
7.10.5;Objective Evaluation of Reverberation;402
7.10.5.1;Standard Quality Assessment Methods;402
7.10.5.2;Articulation Loss of Consonants;403
7.10.6;Conclusions;405
7.10.7;References;405
8;Part IV WINSYS;407
8.1;Conservative Transmit Power Control Mechanism for 802.11 Mesh;408
8.1.1;Introduction;408
8.1.2;Related Work;409
8.1.3;Conservative Transmit Power Control (ConTPC);410
8.1.4;ConTPC Implementation Details;411
8.1.5;Experimental Setup;412
8.1.6;Results;413
8.1.6.1;Delivery Ratio vs. SNR;413
8.1.6.2;Disjoint Case;414
8.1.6.3;Eleven Nodes Testbed Case;416
8.1.6.4;Stability of ConTPC;416
8.1.6.5;Overhead of ConTPC;417
8.1.6.6;ConTPC Parameters Evaluation;418
8.1.7;Conclusions;419
8.1.8;References;419
8.2;Multiple Mobile Sinks Deployment for Energy Efficiency in Large Scale Wireless Sensor Networks;421
8.2.1;Introduction;421
8.2.2;Design Parameters in Energy Constrained WSNs: Description and Related Work;422
8.2.2.1;Network Architecture for WSNs;422
8.2.2.2;Nodes Deployment;424
8.2.2.3;Energy Model;424
8.2.2.4;Single Hop vs. Multi Hop;425
8.2.2.5;Multiple Mobile Sinks;426
8.2.2.6;Overhead Problem;428
8.2.2.7;Buffering Data;428
8.2.2.8;Transmission Range Influence;429
8.2.3;Multiple Sinks Placement in Large Scale WSNs: Proposed Approach;429
8.2.3.1;Existing Graph Partitioning Techniques;430
8.2.3.2;Model Formulation;430
8.2.3.3;Problem Resolution;431
8.2.4;Simulation Results and Analysis;431
8.2.5;Conclusion and Future Work;434
8.2.6;References;435
8.3;Using Vegetation Barriers to Improving Wireless Network Isolation and Security;437
8.3.1;Introduction;437
8.3.2;Measurements;438
8.3.2.1;Measurement Setup;439
8.3.2.2;Measurement Procedure;439
8.3.2.3;Vegetation Species;441
8.3.3;Analysis of the Results;441
8.3.3.1;Attenuation Due to the Vegetation Lines;442
8.3.3.2;Variability with Time;444
8.3.3.3;Application to Interference Mitigation;444
8.3.3.4;Application to Protection against External Attacks;445
8.3.4;Conclusions;446
8.3.5;References;447
8.4;Throughput Maximization for Multiband-OFDM Ultra Wideband Systems with Adaptive Frame Length Control;448
8.4.1;Introduction;448
8.4.2;WiMedia MAC and PHY Protocol Overview;450
8.4.2.1;WiMedia MB-OFDM PHY;450
8.4.2.2;WiMedia MAC;451
8.4.3;Throughput Analysis and Frame Length Optimization;453
8.4.3.1;AnalyticalModel;453
8.4.3.2;Throughput;455
8.4.3.3;Frame Length Optimization Design;456
8.4.4;Numerical Results;457
8.4.5;Conclusions;459
8.4.6;References;460
8.5;Evaluation of Multicast Scheduling and Clustering Schemes with Packet-Level Macro Diversity in High-Speed Cellular Networks;462
8.5.1;Introduction;462
8.5.2;Model Description;464
8.5.2.1;General Considerations;464
8.5.2.2;PropagationModel;464
8.5.3;Proposed Clustering Strategy;465
8.5.4;Multicast Scheduling;466
8.5.4.1;EB Scheduler;467
8.5.4.2;Max-SNR Scheduler;467
8.5.4.3;WFQ-RR;468
8.5.4.4;Generic System Context;468
8.5.5;Multicast Scheduling with SC;469
8.5.5.1;EB with SC;469
8.5.5.2;Max-SNR with SC;469
8.5.5.3;WFQ-RR with SC;470
8.5.6;Multicast Scheduling with MRC;470
8.5.6.1;EB with MRC;471
8.5.6.2;Max-SNR with MRC;471
8.5.6.3;WFQ-RR with MRC;472
8.5.7;Evaluation Results;472
8.5.8;Conclusions;474
8.5.9;References;474
8.6;The Service Distribution Protocol for MANETs - Criteria and Performance Analysis;476
8.6.1;Introduction;476
8.6.2;Overview on the Service Distribution Protocol for MANETs;478
8.6.2.1;ReplicationMechanism;478
8.6.2.2;HibernationMechanism;479
8.6.2.3;Service Caching;479
8.6.3;Network Model;479
8.6.3.1;Mobility Model;480
8.6.3.2;Service Model;480
8.6.3.3;Calling Model;480
8.6.4;Simulation and Discussions;480
8.6.4.1;Configurations;481
8.6.4.2;Performance Analysis;481
8.6.4.3;Extended Performance Analysis;484
8.6.5;Related Work;486
8.6.6;Conclusions;487
8.6.7;References;487
9;Author Index;489



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.