callback( { "result":{ "query":":facetid:toc:\"db/conf/icc/icc2009.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"78.82" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"1029", "@dc":"1029", "@oc":"1029", "@id":"43387123", "text":":facetid:toc:db/conf/icc/icc2009.bht" } }, "hits":{ "@total":"1029", "@computed":"1000", "@sent":"1000", "@first":"0", "hit":[{ "@score":"1", "@id":"5146267", "info":{"authors":{"author":[{"@pid":"63/7881","text":"Anna Abbagnale"},{"@pid":"47/7883","text":"Emanuele Cipollone"},{"@pid":"36/5320","text":"Francesca Cuomo"}]},"title":"A Case Study for Evaluating IEEE 802.15.4 Wireless Sensor Network Formation with Mobile Sinks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AbbagnaleCC09","doi":"10.1109/ICC.2009.5198580","ee":"https://doi.org/10.1109/ICC.2009.5198580","url":"https://dblp.org/rec/conf/icc/AbbagnaleCC09"}, "url":"URL#5146267" }, { "@score":"1", "@id":"5146268", "info":{"authors":{"author":{"@pid":"35/10099","text":"Ali-Azam Abbasfar"}},"title":"Generalized Differential Vector Signaling.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Abbasfar09","doi":"10.1109/ICC.2009.5199045","ee":"https://doi.org/10.1109/ICC.2009.5199045","url":"https://dblp.org/rec/conf/icc/Abbasfar09"}, "url":"URL#5146268" }, { "@score":"1", "@id":"5146269", "info":{"authors":{"author":[{"@pid":"57/6834","text":"Hady S. AbdelSalam"},{"@pid":"o/StephanOlariu","text":"Stephan Olariu"}]},"title":"A Lightweight Skeleton Construction Algorithm for Self-Organizing Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AbdelSalamO09","doi":"10.1109/ICC.2009.5198621","ee":"https://doi.org/10.1109/ICC.2009.5198621","url":"https://dblp.org/rec/conf/icc/AbdelSalamO09"}, "url":"URL#5146269" }, { "@score":"1", "@id":"5146270", "info":{"authors":{"author":[{"@pid":"77/7882","text":"Mai Abdelhakim"},{"@pid":"71/2433","text":"Mohammed H. Nafie"},{"@pid":"47/5251","text":"Ahmed F. Shalash"},{"@pid":"98/3783","text":"Ayman Elezabi"}]},"title":"Adaptive Puncturing for Coded OFDMA Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AbdelhakimNSE09","doi":"10.1109/ICC.2009.5198706","ee":"https://doi.org/10.1109/ICC.2009.5198706","url":"https://dblp.org/rec/conf/icc/AbdelhakimNSE09"}, "url":"URL#5146270" }, { "@score":"1", "@id":"5146271", "info":{"authors":{"author":[{"@pid":"19/3469","text":"Fehmi Ben Abdesslem"},{"@pid":"47/772","text":"Artur Ziviani"},{"@pid":"02/1588","text":"Marcelo Dias de Amorim"},{"@pid":"79/6263","text":"Petia Todorova"}]},"title":"Fair and Flexible Budget-Based Clustering.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AbdesslemZAT09","doi":"10.1109/ICC.2009.5199023","ee":"https://doi.org/10.1109/ICC.2009.5199023","url":"https://dblp.org/rec/conf/icc/AbdesslemZAT09"}, "url":"URL#5146271" }, { "@score":"1", "@id":"5146272", "info":{"authors":{"author":[{"@pid":"29/7882","text":"Asmaa Abid"},{"@pid":"30/3268","text":"Qassim Nasir"},{"@pid":"90/1732","text":"Ahmed S. Elwakil"}]},"title":"Implementation of a Chaotically Encrypted Wireless Communication System.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AbidNE09","doi":"10.1109/ICC.2009.5199069","ee":"https://doi.org/10.1109/ICC.2009.5199069","url":"https://dblp.org/rec/conf/icc/AbidNE09"}, "url":"URL#5146272" }, { "@score":"1", "@id":"5146273", "info":{"authors":{"author":[{"@pid":"01/7533","text":"Hassan A. Abou-Saleh"},{"@pid":"43/4366","text":"Walaa Hamouda"}]},"title":"Cross-Layer Design for MIMO Spatial Multiplexing in Correlated Ricean Fading.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Abou-SalehH09","doi":"10.1109/ICC.2009.5198873","ee":"https://doi.org/10.1109/ICC.2009.5198873","url":"https://dblp.org/rec/conf/icc/Abou-SalehH09"}, "url":"URL#5146273" }, { "@score":"1", "@id":"5146274", "info":{"authors":{"author":[{"@pid":"65/2893","text":"Andrea Abrardo"},{"@pid":"50/5852","text":"Paolo Detti"},{"@pid":"87/2213","text":"Marco Moretti"}]},"title":"Message Passing Resource Allocation for the Uplink of Multicarrier Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AbrardoDM09","doi":"10.1109/ICC.2009.5199180","ee":"https://doi.org/10.1109/ICC.2009.5199180","url":"https://dblp.org/rec/conf/icc/AbrardoDM09"}, "url":"URL#5146274" }, { "@score":"1", "@id":"5146275", "info":{"authors":{"author":{"@pid":"64/2068","text":"Giuseppe Thadeu Freitas de Abreu"}},"title":"Arbitrarily Tight Upper and Lower Bounds on the Gaussian Q-Function and Related Functions.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Abreu09","doi":"10.1109/ICC.2009.5198762","ee":"https://doi.org/10.1109/ICC.2009.5198762","url":"https://dblp.org/rec/conf/icc/Abreu09"}, "url":"URL#5146275" }, { "@score":"1", "@id":"5146276", "info":{"authors":{"author":[{"@pid":"90/2465","text":"Saeed Abu-Nimeh"},{"@pid":"06/4097","text":"Dario Nappa"},{"@pid":"18/2920-1","text":"Xinlei Wang 0001"},{"@pid":"n/VSSNair","text":"Suku Nair"}]},"title":"Distributed Phishing Detection by Applying Variable Selection Using Bayesian Additive Regression Trees.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Abu-NimehNWN09","doi":"10.1109/ICC.2009.5198931","ee":"https://doi.org/10.1109/ICC.2009.5198931","url":"https://dblp.org/rec/conf/icc/Abu-NimehNWN09"}, "url":"URL#5146276" }, { "@score":"1", "@id":"5146277", "info":{"authors":{"author":[{"@pid":"25/7882","text":"Uday Acharya"},{"@pid":"17/5519","text":"Mohamed F. Younis"}]},"title":"An Approach for Increasing Base-Station Anonymity in Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AcharyaY09","doi":"10.1109/ICC.2009.5198720","ee":"https://doi.org/10.1109/ICC.2009.5198720","url":"https://dblp.org/rec/conf/icc/AcharyaY09"}, "url":"URL#5146277" }, { "@score":"1", "@id":"5146278", "info":{"authors":{"author":[{"@pid":"22/1935","text":"Davide Adami"},{"@pid":"42/3320","text":"Christian Callegari"},{"@pid":"80/6788","text":"Stefano Giordano"},{"@pid":"04/374","text":"Michele Pagano"}]},"title":"A New NS2 Module for the Simulation of MPLS Networks with Point-to-Multipoint LSP Support.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AdamiCGP09","doi":"10.1109/ICC.2009.5198644","ee":"https://doi.org/10.1109/ICC.2009.5198644","url":"https://dblp.org/rec/conf/icc/AdamiCGP09"}, "url":"URL#5146278" }, { "@score":"1", "@id":"5146279", "info":{"authors":{"author":[{"@pid":"22/1935","text":"Davide Adami"},{"@pid":"55/3829","text":"Rosario Giuseppe Garroppo"},{"@pid":"80/6788","text":"Stefano Giordano"}]},"title":"Performance Evaluation of MoIP Applications over Satellite: An Experimental Study.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AdamiGG09","doi":"10.1109/ICC.2009.5199323","ee":"https://doi.org/10.1109/ICC.2009.5199323","url":"https://dblp.org/rec/conf/icc/AdamiGG09"}, "url":"URL#5146279" }, { "@score":"1", "@id":"5146280", "info":{"authors":{"author":[{"@pid":"44/3375","text":"Marc Adrat"},{"@pid":"15/7884","text":"Jan Leduc"},{"@pid":"27/7881","text":"Stefan Couturier"},{"@pid":"86/393","text":"Markus Antweiler"},{"@pid":"97/7881","text":"Harald Elders-Boll"}]},"title":"2nd Order Cyclostationarity of OFDM Signals: Impact of Pilot Tones and Cyclic Prefix.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AdratLCAE09","doi":"10.1109/ICC.2009.5198574","ee":"https://doi.org/10.1109/ICC.2009.5198574","url":"https://dblp.org/rec/conf/icc/AdratLCAE09"}, "url":"URL#5146280" }, { "@score":"1", "@id":"5146281", "info":{"authors":{"author":[{"@pid":"48/3914","text":"Adrian Agustin"},{"@pid":"99/1385","text":"Josep Vidal"},{"@pid":"60/4182","text":"Olga Muñoz"}]},"title":"Protocols and Resource Allocation for the Two-Way Relay Channel with Half-Duplex Terminals.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AgustinVM09","doi":"10.1109/ICC.2009.5199374","ee":"https://doi.org/10.1109/ICC.2009.5199374","url":"https://dblp.org/rec/conf/icc/AgustinVM09"}, "url":"URL#5146281" }, { "@score":"1", "@id":"5146282", "info":{"authors":{"author":[{"@pid":"48/3914","text":"Adrian Agustin"},{"@pid":"99/1385","text":"Josep Vidal"},{"@pid":"60/4182","text":"Olga Muñoz"}]},"title":"Adaptive Bitrate and Resource Allocation for Relay-Assisted ARQ Transmissions.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AgustinVM09a","doi":"10.1109/ICC.2009.5198697","ee":"https://doi.org/10.1109/ICC.2009.5198697","url":"https://dblp.org/rec/conf/icc/AgustinVM09a"}, "url":"URL#5146282" }, { "@score":"1", "@id":"5146283", "info":{"authors":{"author":[{"@pid":"45/1115","text":"Qasim Zeeshan Ahmed"},{"@pid":"66/4332","text":"Lie-Liang Yang"},{"@pid":"34/1910","text":"Sheng Chen 0001"}]},"title":"Reduced-Rank Adaptive Least Bit Error-Rate Detection in Hybrid Direct-Sequence Time-Hopping Ultrawide Bandwidth Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AhmedYC09","doi":"10.1109/ICC.2009.5199402","ee":"https://doi.org/10.1109/ICC.2009.5199402","url":"https://dblp.org/rec/conf/icc/AhmedYC09"}, "url":"URL#5146283" }, { "@score":"1", "@id":"5146284", "info":{"authors":{"author":[{"@pid":"a/GailJoonAhn","text":"Gail-Joon Ahn"},{"@pid":"06/411","text":"Moonam Ko"},{"@pid":"89/6785","text":"Mohamed Shehab"}]},"title":"Privacy-Enhanced User-Centric Identity Management.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AhnKS09","doi":"10.1109/ICC.2009.5199363","ee":"https://doi.org/10.1109/ICC.2009.5199363","url":"https://dblp.org/rec/conf/icc/AhnKS09"}, "url":"URL#5146284" }, { "@score":"1", "@id":"5146285", "info":{"authors":{"author":[{"@pid":"01/3015","text":"Nadjib Aitsaadi"},{"@pid":"64/7015","text":"Nadjib Achir"},{"@pid":"70/6690","text":"Khaled Boussetta"},{"@pid":"33/592","text":"Guy Pujolle"}]},"title":"Potential Field Approach to Ensure Connectivity and Differentiated Detection in WSN Deployment.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AitsaadiABP09","doi":"10.1109/ICC.2009.5199345","ee":"https://doi.org/10.1109/ICC.2009.5199345","url":"https://dblp.org/rec/conf/icc/AitsaadiABP09"}, "url":"URL#5146285" }, { "@score":"1", "@id":"5146286", "info":{"authors":{"author":[{"@pid":"69/2089","text":"Efthimia Aivaloglou"},{"@pid":"83/4094","text":"Stefanos Gritzalis"}]},"title":"Trust-Based Data Disclosure in Sensor Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AivaloglouG09","doi":"10.1109/ICC.2009.5199546","ee":"https://doi.org/10.1109/ICC.2009.5199546","url":"https://dblp.org/rec/conf/icc/AivaloglouG09"}, "url":"URL#5146286" }, { "@score":"1", "@id":"5146287", "info":{"authors":{"author":[{"@pid":"07/7882","text":"Sara Akbarzadeh"},{"@pid":"39/5796","text":"Laura Cottatellucci"},{"@pid":"a/EitanAltman","text":"Eitan Altman"},{"@pid":"93/4560","text":"Christian Bonnet"}]},"title":"Distributed Communication Control Mechanisms for Ad Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AkbarzadehCAB09","doi":"10.1109/ICC.2009.5198923","ee":"https://doi.org/10.1109/ICC.2009.5198923","url":"https://dblp.org/rec/conf/icc/AkbarzadehCAB09"}, "url":"URL#5146287" }, { "@score":"1", "@id":"5146288", "info":{"authors":{"author":[{"@pid":"49/2825","text":"Mohammad Ali Akhaee"},{"@pid":"03/4517","text":"Nima Khademi Kalantari"},{"@pid":"06/1232","text":"Farokh Marvasti"}]},"title":"Robust Multiplicative Audio and Speech Watermarking Using Statistical Modeling.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AkhaeeKM09","doi":"10.1109/ICC.2009.5199424","ee":"https://doi.org/10.1109/ICC.2009.5199424","url":"https://dblp.org/rec/conf/icc/AkhaeeKM09"}, "url":"URL#5146288" }, { "@score":"1", "@id":"5146289", "info":{"authors":{"author":[{"@pid":"54/7662","text":"Salam Akoum"},{"@pid":"16/3217","text":"Ronghui Peng"},{"@pid":"04/2896","text":"Rong-Rong Chen"},{"@pid":"69/3244","text":"Behrouz Farhang-Boroujeny"}]},"title":"Markov Chain Monte Carlo Detection Methods for High SNR Regimes.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AkoumPCF09","doi":"10.1109/ICC.2009.5199166","ee":"https://doi.org/10.1109/ICC.2009.5199166","url":"https://dblp.org/rec/conf/icc/AkoumPCF09"}, "url":"URL#5146289" }, { "@score":"1", "@id":"5146290", "info":{"authors":{"author":[{"@pid":"93/6486","text":"Jude Akpuh"},{"@pid":"19/6055","text":"John Doucette 0001"}]},"title":"Designing Demand-Wise Shared Protection Networks with Specified Minimum Dual-Failure Restorability.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AkpuhD09","doi":"10.1109/ICC.2009.5198906","ee":"https://doi.org/10.1109/ICC.2009.5198906","url":"https://dblp.org/rec/conf/icc/AkpuhD09"}, "url":"URL#5146290" }, { "@score":"1", "@id":"5146291", "info":{"authors":{"author":[{"@pid":"24/3450","text":"Basheer Al-Duwairi"},{"@pid":"m/GManimaran","text":"Manimaran Govindarasu"}]},"title":"JUST-Google: A Search Engine-Based Defense Against Botnet-Based DDoS Attacks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Al-DuwairiG09","doi":"10.1109/ICC.2009.5199127","ee":"https://doi.org/10.1109/ICC.2009.5199127","url":"https://dblp.org/rec/conf/icc/Al-DuwairiG09"}, "url":"URL#5146291" }, { "@score":"1", "@id":"5146292", "info":{"authors":{"author":[{"@pid":"22/2131","text":"Ala I. Al-Fuqaha"},{"@pid":"34/2264","text":"Ammar Rayes"},{"@pid":"15/1123","text":"Mohsen Guizani"},{"@pid":"75/7883","text":"Mrinal Khanvilkar"},{"@pid":"58/1386","text":"Mohammed Ahmed"}]},"title":"Intelligent Service Monitoring and Support.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Al-FuqahaRGKA09","doi":"10.1109/ICC.2009.5199087","ee":"https://doi.org/10.1109/ICC.2009.5199087","url":"https://dblp.org/rec/conf/icc/Al-FuqahaRGKA09"}, "url":"URL#5146292" }, { "@score":"1", "@id":"5146293", "info":{"authors":{"author":[{"@pid":"81/7881","text":"Ghaleb Al-Habian"},{"@pid":"37/2687","text":"Ali Ghrayeb"},{"@pid":"14/6360","text":"Mazen Omar Hasna"}]},"title":"Controlling Error Propagation in Network-Coded Cooperative Wireless Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Al-HabianGH09","doi":"10.1109/ICC.2009.5198855","ee":"https://doi.org/10.1109/ICC.2009.5198855","url":"https://dblp.org/rec/conf/icc/Al-HabianGH09"}, "url":"URL#5146293" }, { "@score":"1", "@id":"5146294", "info":{"authors":{"author":[{"@pid":"44/7881","text":"Lina Al-Kanj"},{"@pid":"47/1876","text":"Zaher Dawy"},{"@pid":"t/GeorgeMTurkiyyah","text":"George Turkiyyah"}]},"title":"A Mathematical Optimization Approach for Radio Network Planning of GSM/UMTS Co-Siting.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Al-KanjDT09","doi":"10.1109/ICC.2009.5198627","ee":"https://doi.org/10.1109/ICC.2009.5198627","url":"https://dblp.org/rec/conf/icc/Al-KanjDT09"}, "url":"URL#5146294" }, { "@score":"1", "@id":"5146295", "info":{"authors":{"author":[{"@pid":"26/1831","text":"Osameh M. Al-Kofahi"},{"@pid":"94/5698","text":"Ahmed E. Kamal 0001"}]},"title":"Coding-Aware Scheduling for Reliable Many-to-One Flows.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Al-KofahiK09","doi":"10.1109/ICC.2009.5198830","ee":"https://doi.org/10.1109/ICC.2009.5198830","url":"https://dblp.org/rec/conf/icc/Al-KofahiK09"}, "url":"URL#5146295" }, { "@score":"1", "@id":"5146296", "info":{"authors":{"author":[{"@pid":"18/3784","text":"Fadi M. Al-Turjman"},{"@pid":"07/3173","text":"Hossam S. Hassanein"},{"@pid":"45/2301","text":"Mohamed Ibnkahla"}]},"title":"Connectivity Optimization for Wireless Sensor Networks Applied to Forest Monitoring.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Al-TurjmanHI09","doi":"10.1109/ICC.2009.5198845","ee":"https://doi.org/10.1109/ICC.2009.5198845","url":"https://dblp.org/rec/conf/icc/Al-TurjmanHI09"}, "url":"URL#5146296" }, { "@score":"1", "@id":"5146297", "info":{"authors":{"author":[{"@pid":"36/7882","text":"Seyed Mohamad Alavi"},{"@pid":"43/4289","text":"Chi Zhou"},{"@pid":"96/3060-3","text":"Yu Cheng 0003"}]},"title":"Low Complexity Resource Allocation Algorithm for IEEE 802.16 OFDMA System.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AlaviZC09","doi":"10.1109/ICC.2009.5199154","ee":"https://doi.org/10.1109/ICC.2009.5199154","url":"https://dblp.org/rec/conf/icc/AlaviZC09"}, "url":"URL#5146297" }, { "@score":"1", "@id":"5146298", "info":{"authors":{"author":[{"@pid":"31/5254","text":"Qutaiba Albluwi"},{"@pid":"137/6691","text":"Najah A. Abu Ali"},{"@pid":"07/3173","text":"Hossam S. Hassanein"}]},"title":"A Dynamic Frame Partitioning Scheme for IEEE 802.16 Mesh and Multihop Relay Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AlbluwiAH09","doi":"10.1109/ICC.2009.5198599","ee":"https://doi.org/10.1109/ICC.2009.5198599","url":"https://dblp.org/rec/conf/icc/AlbluwiAH09"}, "url":"URL#5146298" }, { "@score":"1", "@id":"5146299", "info":{"authors":{"author":[{"@pid":"21/930","text":"Juan J. Alcaraz"},{"@pid":"19/1519","text":"Joan García-Haro"}]},"title":"Performance Evaluation of Multiple-Relay Cooperative ARQ Strategies for Mobile Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AlcarazG09","doi":"10.1109/ICC.2009.5199324","ee":"https://doi.org/10.1109/ICC.2009.5199324","url":"https://dblp.org/rec/conf/icc/AlcarazG09"}, "url":"URL#5146299" }, { "@score":"1", "@id":"5146300", "info":{"authors":{"author":[{"@pid":"57/120","text":"Giuseppa Alfano"},{"@pid":"c/CFChiasserini","text":"Carla-Fabiana Chiasserini"},{"@pid":"48/3930","text":"Alessandro Nordio"},{"@pid":"03/4183","text":"Antonia Maria Tulino"}]},"title":"Asymptotics of Multi-Fold Vandermonde Matriceswith Applications to Communications and Radar Problems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AlfanoCNT09","doi":"10.1109/ICC.2009.5198767","ee":"https://doi.org/10.1109/ICC.2009.5198767","url":"https://dblp.org/rec/conf/icc/AlfanoCNT09"}, "url":"URL#5146300" }, { "@score":"1", "@id":"5146301", "info":{"authors":{"author":[{"@pid":"64/5995","text":"Muhammad Ali"},{"@pid":"24/1476","text":"Lei Liang"},{"@pid":"89/1871","text":"Zhili Sun"},{"@pid":"42/2102","text":"Haitham S. Cruickshank"}]},"title":"Evaluation of SIP Signaling and QoS for VoIP over Satellite Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AliLSC09","doi":"10.1109/ICC.2009.5199010","ee":"https://doi.org/10.1109/ICC.2009.5199010","url":"https://dblp.org/rec/conf/icc/AliLSC09"}, "url":"URL#5146301" }, { "@score":"1", "@id":"5146302", "info":{"authors":{"author":[{"@pid":"45/3975","text":"Tariq M. Ali"},{"@pid":"54/6635","text":"Mohammad Saquib"},{"@pid":"26/6270","text":"Chaitali Sengupta"},{"@pid":"31/5319","text":"Yuan Kang Lee"}]},"title":"Modeling of User-Perceived Web-Browsing Performance over a WLAN/3G Inter-Working Environment.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AliSSL09","doi":"10.1109/ICC.2009.5199193","ee":"https://doi.org/10.1109/ICC.2009.5199193","url":"https://dblp.org/rec/conf/icc/AliSSL09"}, "url":"URL#5146302" }, { "@score":"1", "@id":"5146303", "info":{"authors":{"author":[{"@pid":"66/3050","text":"Hisham M. Almasaeid"},{"@pid":"94/5698","text":"Ahmed E. Kamal 0001"}]},"title":"On the Minimum k-Connectivity Repair in Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AlmasaeidK09","doi":"10.1109/ICC.2009.5199257","ee":"https://doi.org/10.1109/ICC.2009.5199257","url":"https://dblp.org/rec/conf/icc/AlmasaeidK09"}, "url":"URL#5146303" }, { "@score":"1", "@id":"5146304", "info":{"authors":{"author":[{"@pid":"42/2969","text":"Fuad E. Alsaadi"},{"@pid":"82/5029","text":"Jaafar M. H. Elmirghani"}]},"title":"Adaptive 2.5 Gbit/s Optical Wireless Systems Employing a Two Dimensional Beam Clustering Method and Imaging Diversity Receivers.","venue":"ICC","pages":"1-8","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AlsaadiE09","doi":"10.1109/ICC.2009.5198694","ee":"https://doi.org/10.1109/ICC.2009.5198694","url":"https://dblp.org/rec/conf/icc/AlsaadiE09"}, "url":"URL#5146304" }, { "@score":"1", "@id":"5146305", "info":{"authors":{"author":[{"@pid":"91/4383","text":"Waleed Alsalih"},{"@pid":"07/3173","text":"Hossam S. Hassanein"},{"@pid":"a/SGAkl","text":"Selim G. Akl"}]},"title":"Routing to a Mobile Data Collector on a Predefined Trajectory.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AlsalihHA09","doi":"10.1109/ICC.2009.5199428","ee":"https://doi.org/10.1109/ICC.2009.5199428","url":"https://dblp.org/rec/conf/icc/AlsalihHA09"}, "url":"URL#5146305" }, { "@score":"1", "@id":"5146306", "info":{"authors":{"author":[{"@pid":"10/1467","text":"Khalid Alsubhi"},{"@pid":"08/2578","text":"Issam Aib"},{"@pid":"29/6239","text":"Jérôme François"},{"@pid":"b/RaoufBoutaba","text":"Raouf Boutaba"}]},"title":"Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AlsubhiAFB09","doi":"10.1109/ICC.2009.5199341","ee":"https://doi.org/10.1109/ICC.2009.5199341","url":"https://dblp.org/rec/conf/icc/AlsubhiAFB09"}, "url":"URL#5146306" }, { "@score":"1", "@id":"5146307", "info":{"authors":{"author":[{"@pid":"67/1810","text":"Alex Alvarado"},{"@pid":"92/6506","text":"Erik Agrell"},{"@pid":"67/7026","text":"Leszek Szczecinski"},{"@pid":"92/4405","text":"Arne Svensson"}]},"title":"Unequal Error Protection in BICM with QAM Constellations: Interleaver and Code Design.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AlvaradoASS09","doi":"10.1109/ICC.2009.5199551","ee":"https://doi.org/10.1109/ICC.2009.5199551","url":"https://dblp.org/rec/conf/icc/AlvaradoASS09"}, "url":"URL#5146307" }, { "@score":"1", "@id":"5146308", "info":{"authors":{"author":[{"@pid":"67/1810","text":"Alex Alvarado"},{"@pid":"47/7882","text":"Víctor Núñez"},{"@pid":"67/7026","text":"Leszek Szczecinski"},{"@pid":"92/6506","text":"Erik Agrell"}]},"title":"Correcting Suboptimal Metrics in Iterative Decoders.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AlvaradoNSA09","doi":"10.1109/ICC.2009.5198866","ee":"https://doi.org/10.1109/ICC.2009.5198866","url":"https://dblp.org/rec/conf/icc/AlvaradoNSA09"}, "url":"URL#5146308" }, { "@score":"1", "@id":"5146309", "info":{"authors":{"author":[{"@pid":"97/151","text":"Salah A. Aly"},{"@pid":"94/5698","text":"Ahmed E. Kamal 0001"}]},"title":"Network Coding-Based Protection Strategy Against Node Failures.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AlyK09","doi":"10.1109/ICC.2009.5199219","ee":"https://doi.org/10.1109/ICC.2009.5199219","url":"https://dblp.org/rec/conf/icc/AlyK09"}, "url":"URL#5146309" }, { "@score":"1", "@id":"5146310", "info":{"authors":{"author":[{"@pid":"97/151","text":"Salah A. Aly"},{"@pid":"52/727","text":"Moustafa Youssef 0001"},{"@pid":"34/7256","text":"Hager S. Darwish"},{"@pid":"96/7255","text":"Mahmoud Zidan"}]},"title":"Distributed Flooding-Based Storage Algorithms for Large-Scale Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AlyYDZ09","doi":"10.1109/ICC.2009.5198919","ee":"https://doi.org/10.1109/ICC.2009.5198919","url":"https://dblp.org/rec/conf/icc/AlyYDZ09"}, "url":"URL#5146310" }, { "@score":"1", "@id":"5146311", "info":{"authors":{"author":[{"@pid":"76/3134","text":"Pedro Amaral"},{"@pid":"72/3100","text":"Luís Bernardo"},{"@pid":"28/1661","text":"Paulo Pinto"}]},"title":"DTIA: An Architecture for Inter-Domain Routing.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AmaralBP09","doi":"10.1109/ICC.2009.5198950","ee":"https://doi.org/10.1109/ICC.2009.5198950","url":"https://dblp.org/rec/conf/icc/AmaralBP09"}, "url":"URL#5146311" }, { "@score":"1", "@id":"5146312", "info":{"authors":{"author":[{"@pid":"27/7883","text":"Mohammad H. Amerimehr"},{"@pid":"05/3014","text":"Farid Ashtiani"},{"@pid":"99/7883","text":"Mohammad Bagher Iraji"}]},"title":"An Analytical Approach for Throughput Evaluation of Wireless Network Coding.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AmerimehrAI09","doi":"10.1109/ICC.2009.5198718","ee":"https://doi.org/10.1109/ICC.2009.5198718","url":"https://dblp.org/rec/conf/icc/AmerimehrAI09"}, "url":"URL#5146312" }, { "@score":"1", "@id":"5146313", "info":{"authors":{"author":[{"@pid":"51/7881","text":"Md. Tanvir Al Amin"},{"@pid":"50/7883","text":"Sukarna Barua"},{"@pid":"92/7881","text":"Sudip Vhaduri"},{"@pid":"25/6358","text":"Ashikur Rahman"}]},"title":"Load Aware Broadcast in Mobile Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AminBVR09","doi":"10.1109/ICC.2009.5199140","ee":"https://doi.org/10.1109/ICC.2009.5199140","url":"https://dblp.org/rec/conf/icc/AminBVR09"}, "url":"URL#5146313" }, { "@score":"1", "@id":"5146314", "info":{"authors":{"author":[{"@pid":"36/6534","text":"Peiman Amini"},{"@pid":"69/3244","text":"Behrouz Farhang-Boroujeny"}]},"title":"Per-Tone Equalizer Design and Analysis of Filtered Multitone Communication Systems over Time-Varying Frequency-Selective Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AminiF09","doi":"10.1109/ICC.2009.5199336","ee":"https://doi.org/10.1109/ICC.2009.5199336","url":"https://dblp.org/rec/conf/icc/AminiF09"}, "url":"URL#5146314" }, { "@score":"1", "@id":"5146315", "info":{"authors":{"author":[{"@pid":"55/5680","text":"S. Mohsen Amiri"},{"@pid":"37/3765","text":"Ivan V. Bajic"}]},"title":"Subset Selection in Type-II Hybrid ARQ/FEC for Video Multicast.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AmiriB09","doi":"10.1109/ICC.2009.5305949","ee":"https://doi.org/10.1109/ICC.2009.5305949","url":"https://dblp.org/rec/conf/icc/AmiriB09"}, "url":"URL#5146315" }, { "@score":"1", "@id":"5146316", "info":{"authors":{"author":[{"@pid":"83/7881","text":"Ki Jin An"},{"@pid":"72/6847","text":"Hwangjun Song"}]},"title":"An Effective Cross-Layer Packet Scheduling and Routing Algorithm for Delay-Sensitive Media Transmission over MANET.","venue":"ICC","pages":"1-4","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AnS09","doi":"10.1109/ICC.2009.5198724","ee":"https://doi.org/10.1109/ICC.2009.5198724","url":"https://dblp.org/rec/conf/icc/AnS09"}, "url":"URL#5146316" }, { "@score":"1", "@id":"5146317", "info":{"authors":{"author":[{"@pid":"57/2802","text":"Yash P. Aneja"},{"@pid":"71/5853","text":"Ataul Bari"},{"@pid":"j/ArunitaJaekel","text":"Arunita Jaekel"},{"@pid":"c/RChandrasekaran","text":"Ramaswamy Chandrasekaran"},{"@pid":"69/4419","text":"K. P. K. Nair"}]},"title":"Minimum Energy Strong Bidirectional Topology for Ad Hoc Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AnejaBJCN09","doi":"10.1109/ICC.2009.5199183","ee":"https://doi.org/10.1109/ICC.2009.5199183","url":"https://dblp.org/rec/conf/icc/AnejaBJCN09"}, "url":"URL#5146317" }, { "@score":"1", "@id":"5146318", "info":{"authors":{"author":[{"@pid":"36/5786","text":"Paul A. Anghel"},{"@pid":"04/4072","text":"Mostafa Kaveh"}]},"title":"On the Performance of Selection Cooperation ARQ.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AnghelK09","doi":"10.1109/ICC.2009.5199265","ee":"https://doi.org/10.1109/ICC.2009.5199265","url":"https://dblp.org/rec/conf/icc/AnghelK09"}, "url":"URL#5146318" }, { "@score":"1", "@id":"5146319", "info":{"authors":{"author":[{"@pid":"16/5354","text":"Antti Anttonen"},{"@pid":"19/5229","text":"Aarne Mämmelä"},{"@pid":"87/5723","text":"Adrian Kotelba"}]},"title":"Error Probability of Energy Detected Multilevel PAM Signals in Lognormal Multipath Fading Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AnttonenMK09","doi":"10.1109/ICC.2009.5199001","ee":"https://doi.org/10.1109/ICC.2009.5199001","url":"https://dblp.org/rec/conf/icc/AnttonenMK09"}, "url":"URL#5146319" }, { "@score":"1", "@id":"5146320", "info":{"authors":{"author":[{"@pid":"41/8899","text":"Eva Arias-de-Reyna"},{"@pid":"71/5196","text":"Umberto Mengali"}]},"title":"Mapping Techniques for UWB Positioning.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Arias-de-ReynaM09","doi":"10.1109/ICC.2009.5199163","ee":"https://doi.org/10.1109/ICC.2009.5199163","url":"https://dblp.org/rec/conf/icc/Arias-de-ReynaM09"}, "url":"URL#5146320" }, { "@score":"1", "@id":"5146321", "info":{"authors":{"author":[{"@pid":"86/658","text":"Ana García Armada"},{"@pid":"54/6358","text":"Li Hong"},{"@pid":"84/1348","text":"Angel E. Lozano"}]},"title":"Bit Loading for MIMO with Statistical Channel Information at the Transmitter and ZF Receivers.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ArmadaHL09","doi":"10.1109/ICC.2009.5198786","ee":"https://doi.org/10.1109/ICC.2009.5198786","url":"https://dblp.org/rec/conf/icc/ArmadaHL09"}, "url":"URL#5146321" }, { "@score":"1", "@id":"5146322", "info":{"authors":{"author":[{"@pid":"71/384","text":"Vahid Asghari"},{"@pid":"77/1439","text":"Sonia Aïssa"}]},"title":"Rate and Power Adaptation for Increasing Spectrum Efficiency in Cognitive Radio Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AsghariA09","doi":"10.1109/ICC.2009.5199391","ee":"https://doi.org/10.1109/ICC.2009.5199391","url":"https://dblp.org/rec/conf/icc/AsghariA09"}, "url":"URL#5146322" }, { "@score":"1", "@id":"5146323", "info":{"authors":{"author":[{"@pid":"41/5998","text":"Amir Askarian"},{"@pid":"10/4014","text":"Suresh Subramaniam 0001"},{"@pid":"23/6358","text":"Maïté Brandt-Pearce"}]},"title":"Evaluation of Link Protection Schemes in Physically Impaired Optical Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AskarianSB09","doi":"10.1109/ICC.2009.5199008","ee":"https://doi.org/10.1109/ICC.2009.5199008","url":"https://dblp.org/rec/conf/icc/AskarianSB09"}, "url":"URL#5146323" }, { "@score":"1", "@id":"5146324", "info":{"authors":{"author":[{"@pid":"27/2365","text":"Antonio Assalini"},{"@pid":"45/7883","text":"Emiliano Dall'Anese"},{"@pid":"58/4062","text":"Silvano Pupolin"}]},"title":"Linear MMSE MIMO Channel Estimation with Imperfect Channel Covariance Information.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AssaliniDP09","doi":"10.1109/ICC.2009.5199136","ee":"https://doi.org/10.1109/ICC.2009.5199136","url":"https://dblp.org/rec/conf/icc/AssaliniDP09"}, "url":"URL#5146324" }, { "@score":"1", "@id":"5146325", "info":{"authors":{"author":[{"@pid":"57/7881","text":"Stylianos D. Assimonis"},{"@pid":"74/4742","text":"Michail Matthaiou"},{"@pid":"13/5195","text":"George K. Karagiannidis"},{"@pid":"50/2506","text":"Josef A. Nossek"}]},"title":"Parametric Construction of Improved Nyquist Filters Based on Inner and Outer Functions.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AssimonisMKN09","doi":"10.1109/ICC.2009.5199301","ee":"https://doi.org/10.1109/ICC.2009.5199301","url":"https://dblp.org/rec/conf/icc/AssimonisMKN09"}, "url":"URL#5146325" }, { "@score":"1", "@id":"5146326", "info":{"authors":{"author":[{"@pid":"78/3236","text":"George Athanasiou"},{"@pid":"89/3802","text":"Ioannis Broustis"},{"@pid":"84/4337","text":"Thanasis Korakis"},{"@pid":"03/3843","text":"Leandros Tassiulas"}]},"title":"Routing-Aware Channel Selection in Multi-Radio Mesh Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AthanasiouBKT09","doi":"10.1109/ICC.2009.5199429","ee":"https://doi.org/10.1109/ICC.2009.5199429","url":"https://dblp.org/rec/conf/icc/AthanasiouBKT09"}, "url":"URL#5146326" }, { "@score":"1", "@id":"5146327", "info":{"authors":{"author":[{"@pid":"35/1027","text":"Gunther Auer"},{"@pid":"48/5061","text":"Ivan Cosovic"}]},"title":"Pilot Design of MIMO-OFDM with Beamforming.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AuerC09","doi":"10.1109/ICC.2009.5199339","ee":"https://doi.org/10.1109/ICC.2009.5199339","url":"https://dblp.org/rec/conf/icc/AuerC09"}, "url":"URL#5146327" }, { "@score":"1", "@id":"5146328", "info":{"authors":{"author":[{"@pid":"62/6786","text":"Zlatka Avramova"},{"@pid":"42/1824","text":"Sabine Wittevrongel"},{"@pid":"63/4962","text":"Herwig Bruneel"},{"@pid":"07/1497","text":"Danny De Vleeschauwer"}]},"title":"Dimensioning of a Multi-Rate Network Transporting Variable Bit Rate TV Channels.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AvramovaWBV09","doi":"10.1109/ICC.2009.5198918","ee":"https://doi.org/10.1109/ICC.2009.5198918","url":"https://dblp.org/rec/conf/icc/AvramovaWBV09"}, "url":"URL#5146328" }, { "@score":"1", "@id":"5146329", "info":{"authors":{"author":[{"@pid":"84/1525","text":"Mohamad Khattar Awad"},{"@pid":"04/5657","text":"Veluppillai Mahinthan"},{"@pid":"23/6705","text":"Mehri Mehrjoo"},{"@pid":"s/XueminShen","text":"Xuemin (Sherman) Shen"},{"@pid":"m/JonWMark","text":"Jon W. Mark"}]},"title":"Downlink Resource Allocation for OFDMA-Based Multiservice Networks with Imperfect CSI.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AwadMMSM09","doi":"10.1109/ICC.2009.5198947","ee":"https://doi.org/10.1109/ICC.2009.5198947","url":"https://dblp.org/rec/conf/icc/AwadMMSM09"}, "url":"URL#5146329" }, { "@score":"1", "@id":"5146330", "info":{"authors":{"author":[{"@pid":"63/2889","text":"Tuncer C. Aysal"},{"@pid":"24/6312","text":"Kandeepan Sithamparanathan"},{"@pid":"77/5676","text":"Radoslaw Piesiewicz"}]},"title":"Cooperative Spectrum Sensing with Noisy Hard Decision Transmissions.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AysalSP09","doi":"10.1109/ICC.2009.5198863","ee":"https://doi.org/10.1109/ICC.2009.5198863","url":"https://dblp.org/rec/conf/icc/AysalSP09"}, "url":"URL#5146330" }, { "@score":"1", "@id":"5146331", "info":{"authors":{"author":[{"@pid":"79/4437","text":"Tahir Azim"},{"@pid":"10/7883","text":"Qasim Mansoor"},{"@pid":"91/2665","text":"Philip Alexander Levis"}]},"title":"Starburst SSD: An Efficient Protocol for Selective Dissemination.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AzimML09","doi":"10.1109/ICC.2009.5199485","ee":"https://doi.org/10.1109/ICC.2009.5199485","url":"https://dblp.org/rec/conf/icc/AzimML09"}, "url":"URL#5146331" }, { "@score":"1", "@id":"5146332", "info":{"authors":{"author":[{"@pid":"22/5125","text":"Imad H. Azzam"},{"@pid":"22/3660","text":"Raviraj Adve"}]},"title":"Linear Precoding for Multiuser MIMO Systems with Multiple Base Stations.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/AzzamA09","doi":"10.1109/ICC.2009.5199137","ee":"https://doi.org/10.1109/ICC.2009.5199137","url":"https://dblp.org/rec/conf/icc/AzzamA09"}, "url":"URL#5146332" }, { "@score":"1", "@id":"5146333", "info":{"authors":{"author":[{"@pid":"47/47","text":"Fulvio Babich"},{"@pid":"20/4194","text":"Massimiliano Comisso"},{"@pid":"62/779","text":"Marco D'Orlando"},{"@pid":"80/7883","text":"Aljosa Dorni"}]},"title":"Quality of Service in 802.11 Networks: Modeling and Experimental Evaluation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BabichCDD09","doi":"10.1109/ICC.2009.5199382","ee":"https://doi.org/10.1109/ICC.2009.5199382","url":"https://dblp.org/rec/conf/icc/BabichCDD09"}, "url":"URL#5146333" }, { "@score":"1", "@id":"5146334", "info":{"authors":{"author":[{"@pid":"60/2171","text":"Enzo Baccarelli"},{"@pid":"60/4488","text":"Mauro Biagi"},{"@pid":"34/1445","text":"Nicola Cordeschi"},{"@pid":"00/2596","text":"Cristian Pelizzoni"}]},"title":"Optimal Cross-Layer Bandwidth Adaptation for Maximum-Throughput VBR Media Wireless Content Delivery.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BaccarelliBCP09","doi":"10.1109/ICC.2009.5199278","ee":"https://doi.org/10.1109/ICC.2009.5199278","url":"https://dblp.org/rec/conf/icc/BaccarelliBCP09"}, "url":"URL#5146334" }, { "@score":"1", "@id":"5146335", "info":{"authors":{"author":[{"@pid":"35/427","text":"Osamah S. Badarneh"},{"@pid":"84/4625","text":"Yi Qian"},{"@pid":"68/3369","text":"Bo Rong"},{"@pid":"e/AhmedKElhakeem","text":"Ahmed K. Elhakeem"},{"@pid":"36/2183","text":"Michel Kadoch"}]},"title":"Multiple Description Coding Based Video Multicast over Heterogeneous Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BadarnehQREK09","doi":"10.1109/ICC.2009.5199205","ee":"https://doi.org/10.1109/ICC.2009.5199205","url":"https://dblp.org/rec/conf/icc/BadarnehQREK09"}, "url":"URL#5146335" }, { "@score":"1", "@id":"5146336", "info":{"authors":{"author":[{"@pid":"75/3888","text":"Leonardo Badia"},{"@pid":"47/2386","text":"Marco Levorato"},{"@pid":"14/2991","text":"Michele Zorzi"}]},"title":"Analysis of Selective Retransmission Techniques for Differentially Encoded Data.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BadiaLZ09","doi":"10.1109/ICC.2009.5198746","ee":"https://doi.org/10.1109/ICC.2009.5198746","url":"https://dblp.org/rec/conf/icc/BadiaLZ09"}, "url":"URL#5146336" }, { "@score":"1", "@id":"5146337", "info":{"authors":{"author":[{"@pid":"96/4193","text":"Seon Yeob Baek"},{"@pid":"65/3004","text":"Dan Keun Sung"}]},"title":"Radio Resource Allocation Schemes in Hybrid Mode Wireless Communication Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BaekS09","doi":"10.1109/ICC.2009.5199385","ee":"https://doi.org/10.1109/ICC.2009.5199385","url":"https://dblp.org/rec/conf/icc/BaekS09"}, "url":"URL#5146337" }, { "@score":"1", "@id":"5146338", "info":{"authors":{"author":[{"@pid":"69/3749","text":"Marjan A. Baghaie"},{"@pid":"87/2250","text":"Bhaskar Krishnamachari"}]},"title":"Fast Flooding using Cooperative Transmissions in Wireless Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BaghaieK09","doi":"10.1109/ICC.2009.5199028","ee":"https://doi.org/10.1109/ICC.2009.5199028","url":"https://dblp.org/rec/conf/icc/BaghaieK09"}, "url":"URL#5146338" }, { "@score":"1", "@id":"5146339", "info":{"authors":{"author":[{"@pid":"12/1581","text":"Farid Baguenine"},{"@pid":"03/6403","text":"Abdelhamid Mellouk"}]},"title":"QoS Swarm State Dependent Routing for Irregular Traffic in Telecommunication Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BaguenineM09","doi":"10.1109/ICC.2009.5199379","ee":"https://doi.org/10.1109/ICC.2009.5199379","url":"https://dblp.org/rec/conf/icc/BaguenineM09"}, "url":"URL#5146339" }, { "@score":"1", "@id":"5146340", "info":{"authors":{"author":[{"@pid":"04/7819","text":"Sohail Bahmani"},{"@pid":"37/3765","text":"Ivan V. Bajic"},{"@pid":"05/4366","text":"Atousa Hajshirmohammadi"}]},"title":"Improved Joint Source-Channel Decoding of JPEG2000 Images and Reed-Solomon Codes.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BahmaniBH09","doi":"10.1109/ICC.2009.5305946","ee":"https://doi.org/10.1109/ICC.2009.5305946","url":"https://dblp.org/rec/conf/icc/BahmaniBH09"}, "url":"URL#5146340" }, { "@score":"1", "@id":"5146341", "info":{"authors":{"author":[{"@pid":"10/4008-1","text":"Bo Bai 0001"},{"@pid":"c/WeiChen2","text":"Wei Chen 0002"},{"@pid":"11/3799-1","text":"Zhigang Cao 0001"},{"@pid":"95/5358","text":"Khaled Ben Letaief"}]},"title":"Optimal Diversity-Multiplexing Tradeoff in OFDMA Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BaiCCL09","doi":"10.1109/ICC.2009.5199279","ee":"https://doi.org/10.1109/ICC.2009.5199279","url":"https://dblp.org/rec/conf/icc/BaiCCL09"}, "url":"URL#5146341" }, { "@score":"1", "@id":"5146342", "info":{"authors":{"author":[{"@pid":"54/7494","text":"Xiang-yu Bai"},{"@pid":"31/1280","text":"Xinming Ye"},{"@pid":"l/JunLi2","text":"Jun Li 0002"},{"@pid":"15/5983-4","text":"Hai Jiang 0004"}]},"title":"VLS: A Map-Based Vehicle Location Service for City Environments.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BaiYLJ09","doi":"10.1109/ICC.2009.5199568","ee":"https://doi.org/10.1109/ICC.2009.5199568","url":"https://dblp.org/rec/conf/icc/BaiYLJ09"}, "url":"URL#5146342" }, { "@score":"1", "@id":"5146343", "info":{"authors":{"author":[{"@pid":"01/6200","text":"Mohammed W. Baidas"},{"@pid":"23/83","text":"Ahmed S. Ibrahim 0001"},{"@pid":"65/3089","text":"Karim G. Seddik"},{"@pid":"68/3163","text":"K. J. Ray Liu"}]},"title":"On the Impact of Correlation on Distributed Detection in Wireless Sensor Networks with Relays Deployment.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BaidasISL09","doi":"10.1109/ICC.2009.5199254","ee":"https://doi.org/10.1109/ICC.2009.5199254","url":"https://dblp.org/rec/conf/icc/BaidasISL09"}, "url":"URL#5146343" }, { "@score":"1", "@id":"5146344", "info":{"authors":{"author":[{"@pid":"94/2319","text":"Nicola Baldo"},{"@pid":"26/4025","text":"Tamma Bheemarjuna Reddy"},{"@pid":"47/5130","text":"B. S. Manoj 0001"},{"@pid":"r/RameshRRao","text":"Ramesh R. Rao"},{"@pid":"14/2991","text":"Michele Zorzi"}]},"title":"A Neural Network Based Cognitive Controller for Dynamic Channel Selection.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BaldoRMRZ09","doi":"10.1109/ICC.2009.5198636","ee":"https://doi.org/10.1109/ICC.2009.5198636","url":"https://dblp.org/rec/conf/icc/BaldoRMRZ09"}, "url":"URL#5146344" }, { "@score":"1", "@id":"5146345", "info":{"authors":{"author":[{"@pid":"30/7882","text":"Tommaso Balercia"},{"@pid":"33/4569","text":"Valerio Frascolla"},{"@pid":"26/1163","text":"Attila Bilgic"}]},"title":"Coverage Prediction in Urban Environments for Inter-System Mobility Simulations.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BalerciaFB09","doi":"10.1109/ICC.2009.5198868","ee":"https://doi.org/10.1109/ICC.2009.5198868","url":"https://dblp.org/rec/conf/icc/BalerciaFB09"}, "url":"URL#5146345" }, { "@score":"1", "@id":"5146346", "info":{"authors":{"author":[{"@pid":"82/7881","text":"Armin Banaei"},{"@pid":"37/4033","text":"Costas N. Georghiades"}]},"title":"Throughput Analysis of a Randomized Sensing Scheme in Cell-Based Ad-Hoc Cognitive Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BanaeiG09","doi":"10.1109/ICC.2009.5199524","ee":"https://doi.org/10.1109/ICC.2009.5199524","url":"https://dblp.org/rec/conf/icc/BanaeiG09"}, "url":"URL#5146346" }, { "@score":"1", "@id":"5146347", "info":{"authors":{"author":[{"@pid":"73/3006","text":"Subir Bandyopadhyay"},{"@pid":"46/5339","text":"Quazi Rahman"},{"@pid":"54/7883","text":"Sujogya Banerjee"},{"@pid":"56/3266","text":"Sudheendra Murthy"},{"@pid":"s/ArunabhaSen","text":"Arunabha Sen"}]},"title":"Dynamic Lightpath Allocation in Translucent WDM Optical Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BandyopadhyayRBMS09","doi":"10.1109/ICC.2009.5198956","ee":"https://doi.org/10.1109/ICC.2009.5198956","url":"https://dblp.org/rec/conf/icc/BandyopadhyayRBMS09"}, "url":"URL#5146347" }, { "@score":"1", "@id":"5146348", "info":{"authors":{"author":[{"@pid":"77/5283","text":"Elena Baralis"},{"@pid":"81/5311","text":"Andrea Bianco"},{"@pid":"20/5348","text":"Tania Cerquitelli"},{"@pid":"54/7881","text":"Luca Chiaraviglio"},{"@pid":"18/6316","text":"Marco Mellia"}]},"title":"NetCluster: A Clustering-Based Framework for Internet Tomography.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BaralisBCCM09","doi":"10.1109/ICC.2009.5199216","ee":"https://doi.org/10.1109/ICC.2009.5199216","url":"https://dblp.org/rec/conf/icc/BaralisBCCM09"}, "url":"URL#5146348" }, { "@score":"1", "@id":"5146349", "info":{"authors":{"author":[{"@pid":"b/JohnSBaras","text":"John S. Baras"},{"@pid":"t/VahidTabatabaee","text":"Vahid Tabatabaee"},{"@pid":"84/373","text":"Punyaslok Purkayastha"},{"@pid":"49/7076","text":"Kiran Somasundaram"}]},"title":"Component Based Performance Modelling of Wireless Routing Protocols.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BarasTPS09","doi":"10.1109/ICC.2009.5198840","ee":"https://doi.org/10.1109/ICC.2009.5198840","url":"https://dblp.org/rec/conf/icc/BarasTPS09"}, "url":"URL#5146349" }, { "@score":"1", "@id":"5146350", "info":{"authors":{"author":[{"@pid":"04/4694","text":"Luis G. Barbero"},{"@pid":"50/318","text":"David L. Milliner"},{"@pid":"69/6831","text":"Tharmalingam Ratnarajah"},{"@pid":"29/1435","text":"John R. Barry"},{"@pid":"c/ColinCowan","text":"Colin Cowan"}]},"title":"Rapid Prototyping of Clarkson's Lattice Reduction for MIMO Detection.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BarberoMRBC09","doi":"10.1109/ICC.2009.5199388","ee":"https://doi.org/10.1109/ICC.2009.5199388","url":"https://dblp.org/rec/conf/icc/BarberoMRBC09"}, "url":"URL#5146350" }, { "@score":"1", "@id":"5146351", "info":{"authors":{"author":[{"@pid":"86/3134","text":"Andrea Barbieri"},{"@pid":"51/3942","text":"Romano Fantacci"},{"@pid":"58/5643","text":"Leonardo Maccari"}]},"title":"A Novel Interface Selection Scheme for Multi-Interface Wireless Mesh Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BarbieriFM09","doi":"10.1109/ICC.2009.5198650","ee":"https://doi.org/10.1109/ICC.2009.5198650","url":"https://dblp.org/rec/conf/icc/BarbieriFM09"}, "url":"URL#5146351" }, { "@score":"1", "@id":"5146352", "info":{"authors":{"author":[{"@pid":"75/2019","text":"Paolo Barsocchi"},{"@pid":"84/1994","text":"Stefano Lenzi"},{"@pid":"74/5008","text":"Stefano Chessa"},{"@pid":"36/5948","text":"Gaetano Giunta"}]},"title":"Virtual Calibration for RSSI-Based Indoor Localization with IEEE 802.15.4.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BarsocchiLCG09","doi":"10.1109/ICC.2009.5199566","ee":"https://doi.org/10.1109/ICC.2009.5199566","url":"https://dblp.org/rec/conf/icc/BarsocchiLCG09"}, "url":"URL#5146352" }, { "@score":"1", "@id":"5146353", "info":{"authors":{"author":[{"@pid":"43/2906","text":"Dominique Barth"},{"@pid":"22/962","text":"Thierry Mautor"},{"@pid":"72/7883","text":"Daniel Villa Monteiro"}]},"title":"Impact of Alliances on End-to-End QoS Satisfaction in an Interdomain Network.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BarthMM09","doi":"10.1109/ICC.2009.5199065","ee":"https://doi.org/10.1109/ICC.2009.5199065","url":"https://dblp.org/rec/conf/icc/BarthMM09"}, "url":"URL#5146353" }, { "@score":"1", "@id":"5146354", "info":{"authors":{"author":[{"@pid":"99/2059","text":"Stefano Basagni"},{"@pid":"53/1066","text":"Alessio Carosi"},{"@pid":"57/6354","text":"Chiara Petrioli"}]},"title":"Heuristics for Lifetime Maximization in Wireless Sensor Networks with Multiple Mobile Sinks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BasagniCP09","doi":"10.1109/ICC.2009.5199052","ee":"https://doi.org/10.1109/ICC.2009.5199052","url":"https://dblp.org/rec/conf/icc/BasagniCP09"}, "url":"URL#5146354" }, { "@score":"1", "@id":"5146355", "info":{"authors":{"author":[{"@pid":"87/2443","text":"Robert J. Baxley"},{"@pid":"90/5470","text":"Brett T. Walkenhorst"},{"@pid":"29/4910","text":"G. Tong Zhou"}]},"title":"Signal Classification Using a Peak-to-Average Power Ratio Statistic.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BaxleyWZ09","doi":"10.1109/ICC.2009.5199458","ee":"https://doi.org/10.1109/ICC.2009.5199458","url":"https://dblp.org/rec/conf/icc/BaxleyWZ09"}, "url":"URL#5146355" }, { "@score":"1", "@id":"5146356", "info":{"authors":{"author":[{"@pid":"75/583","text":"Tarek Bejaoui"},{"@pid":"22/5508","text":"Lynda Mokdad"}]},"title":"Adaptive Hybrid Call Admission Control Policy for UMTS with Underlying Tunnel-WLANs Heterogeneous Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BejaouiM09","doi":"10.1109/ICC.2009.5198701","ee":"https://doi.org/10.1109/ICC.2009.5198701","url":"https://dblp.org/rec/conf/icc/BejaouiM09"}, "url":"URL#5146356" }, { "@score":"1", "@id":"5146357", "info":{"authors":{"author":[{"@pid":"73/7881","text":"Marco Belleschi"},{"@pid":"98/7882","text":"Lapo Balucanti"},{"@pid":"31/2514","text":"Pablo Soldati"},{"@pid":"53/764-1","text":"Mikael Johansson 0001"},{"@pid":"65/2893","text":"Andrea Abrardo"}]},"title":"Fast Power Control for Cross-Layer Optimal Resource Allocation in DS-CDMA Wireless Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BelleschiBSJA09","doi":"10.1109/ICC.2009.5199029","ee":"https://doi.org/10.1109/ICC.2009.5199029","url":"https://dblp.org/rec/conf/icc/BelleschiBSJA09"}, "url":"URL#5146357" }, { "@score":"1", "@id":"5146358", "info":{"authors":{"author":[{"@pid":"207/0296","text":"Ralf M. Bendlin"},{"@pid":"88/3754","text":"Yih-Fang Huang"},{"@pid":"57/6614","text":"Michel T. Ivrlac"},{"@pid":"50/2506","text":"Josef A. Nossek"}]},"title":"Fast Distributed Multi-Cell Scheduling with Delayed Limited-Capacity Backhaul Links.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BendlinHIN09","doi":"10.1109/ICC.2009.5199027","ee":"https://doi.org/10.1109/ICC.2009.5199027","url":"https://dblp.org/rec/conf/icc/BendlinHIN09"}, "url":"URL#5146358" }, { "@score":"1", "@id":"5146359", "info":{"authors":{"author":[{"@pid":"71/3243","text":"Francesco Benedetto"},{"@pid":"36/5948","text":"Gaetano Giunta"},{"@pid":"v/LucVandendorpe","text":"Luc Vandendorpe"}]},"title":"On the Performance Improvements of Max-SINR Equalizers in Wireless Communications.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BenedettoGV09","doi":"10.1109/ICC.2009.5199260","ee":"https://doi.org/10.1109/ICC.2009.5199260","url":"https://dblp.org/rec/conf/icc/BenedettoGV09"}, "url":"URL#5146359" }, { "@score":"1", "@id":"5146360", "info":{"authors":{"author":[{"@pid":"64/3711","text":"Sergio A. Bermudez"},{"@pid":"21/3476","text":"Stephen B. Wicker"}]},"title":"Connectivity of Finite Wireless Networks with Random Communication Range Nodes.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BermudezW09","doi":"10.1109/ICC.2009.5198844","ee":"https://doi.org/10.1109/ICC.2009.5198844","url":"https://dblp.org/rec/conf/icc/BermudezW09"}, "url":"URL#5146360" }, { "@score":"1", "@id":"5146361", "info":{"authors":{"author":[{"@pid":"67/5510-2","text":"Francisco Bernardo 0002"},{"@pid":"95/6471","text":"Ramón Agustí"},{"@pid":"74/84","text":"Jordi Pérez-Romero"},{"@pid":"65/314","text":"Oriol Sallent"}]},"title":"A Self-Organized Spectrum Assignment Strategy in Next Generation OFDMA Networks Providing Secondary Spectrum Access.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BernardoAPS09","doi":"10.1109/ICC.2009.5198667","ee":"https://doi.org/10.1109/ICC.2009.5198667","url":"https://dblp.org/rec/conf/icc/BernardoAPS09"}, "url":"URL#5146361" }, { "@score":"1", "@id":"5146362", "info":{"authors":{"author":[{"@pid":"09/2602","text":"Sibi Raj Bhaskaran"},{"@pid":"25/3433","text":"Stephen V. Hanly"},{"@pid":"22/7883","text":"Nasreen Badruddin"},{"@pid":"84/3479","text":"Jamie S. Evans"}]},"title":"Maximizing the Sum Rate in Symmetric Networks of Interfering Links.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BhaskaranHBE09","doi":"10.1109/ICC.2009.5199170","ee":"https://doi.org/10.1109/ICC.2009.5199170","url":"https://dblp.org/rec/conf/icc/BhaskaranHBE09"}, "url":"URL#5146362" }, { "@score":"1", "@id":"5146363", "info":{"authors":{"author":[{"@pid":"35/2293","text":"Yuanguo Bi"},{"@pid":"25/1145-2","text":"Hai Zhao 0002"},{"@pid":"s/XueminShen","text":"Xuemin (Sherman) Shen"}]},"title":"A Directional Broadcast Protocol for Emergency Message Exchange in Inter-Vehicle Communications.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BiZS09","doi":"10.1109/ICC.2009.5198592","ee":"https://doi.org/10.1109/ICC.2009.5198592","url":"https://dblp.org/rec/conf/icc/BiZS09"}, "url":"URL#5146363" }, { "@score":"1", "@id":"5146364", "info":{"authors":{"author":[{"@pid":"15/7883","text":"Tao Bian"},{"@pid":"17/5748","text":"Ramachandran Venkatesan"},{"@pid":"16/6465-5","text":"Cheng Li 0005"}]},"title":"Adaptive Time Synchronization for Wireless Sensor Networks with Self-Calibration.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BianVL09","doi":"10.1109/ICC.2009.5198710","ee":"https://doi.org/10.1109/ICC.2009.5198710","url":"https://dblp.org/rec/conf/icc/BianVL09"}, "url":"URL#5146364" }, { "@score":"1", "@id":"5146365", "info":{"authors":{"author":[{"@pid":"92/5078","text":"Thorsten Biermann"},{"@pid":"07/205","text":"Christian Dannewitz"},{"@pid":"k/HolgerKarl","text":"Holger Karl"}]},"title":"An Adaptive Resource/Performance Trade-Off for Resolving Complex Queries in P2P Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BiermannDK09","doi":"10.1109/ICC.2009.5198716","ee":"https://doi.org/10.1109/ICC.2009.5198716","url":"https://dblp.org/rec/conf/icc/BiermannDK09"}, "url":"URL#5146365" }, { "@score":"1", "@id":"5146366", "info":{"authors":{"author":[{"@pid":"96/7880","text":"Giacomo Binazzi"},{"@pid":"68/5289","text":"Luigi Chisci"},{"@pid":"40/1186","text":"Francesco Chiti"},{"@pid":"51/3942","text":"Romano Fantacci"},{"@pid":"21/4146","text":"Simone Menci"}]},"title":"Localization of a Swarm of Mobile Agents via Unscented Kalman Filtering.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BinazziCCFM09","doi":"10.1109/ICC.2009.5199143","ee":"https://doi.org/10.1109/ICC.2009.5199143","url":"https://dblp.org/rec/conf/icc/BinazziCCFM09"}, "url":"URL#5146366" }, { "@score":"1", "@id":"5146367", "info":{"authors":{"author":[{"@pid":"32/7883","text":"Abdur Rahim Biswas"},{"@pid":"63/2889","text":"Tuncer C. Aysal"},{"@pid":"24/6312","text":"Kandeepan Sithamparanathan"},{"@pid":"54/5802","text":"Dzmitry Kliazovich"},{"@pid":"77/5676","text":"Radoslaw Piesiewicz"}]},"title":"Cooperative Shared Spectrum Sensing for Dynamic Cognitive Radio Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BiswasASKP09","doi":"10.1109/ICC.2009.5198862","ee":"https://doi.org/10.1109/ICC.2009.5198862","url":"https://dblp.org/rec/conf/icc/BiswasASKP09"}, "url":"URL#5146367" }, { "@score":"1", "@id":"5146368", "info":{"authors":{"author":[{"@pid":"89/1416","text":"Roland Bless"},{"@pid":"42/5929","text":"Martin Röhricht"}]},"title":"Secure Signaling in Next Generation Networks with NSIS.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BlessR09","doi":"10.1109/ICC.2009.5199441","ee":"https://doi.org/10.1109/ICC.2009.5199441","url":"https://dblp.org/rec/conf/icc/BlessR09"}, "url":"URL#5146368" }, { "@score":"1", "@id":"5146369", "info":{"authors":{"author":[{"@pid":"21/6408","text":"Aggelos Bletsas"},{"@pid":"36/7881","text":"Antonis G. Dimitriou"},{"@pid":"09/3066","text":"John N. Sahalos"}]},"title":"Reduced-Delay Interference-Aware Opportunistic Relaying.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BletsasDS09","doi":"10.1109/ICC.2009.5199401","ee":"https://doi.org/10.1109/ICC.2009.5199401","url":"https://dblp.org/rec/conf/icc/BletsasDS09"}, "url":"URL#5146369" }, { "@score":"1", "@id":"5146370", "info":{"authors":{"author":[{"@pid":"02/7883","text":"Joseph Blomer"},{"@pid":"28/279","text":"Nihar Jindal"}]},"title":"Transmission Capacity of Wireless Ad Hoc Networks: Successive Interference Cancellation vs. Joint Detection.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BlomerJ09","doi":"10.1109/ICC.2009.5199541","ee":"https://doi.org/10.1109/ICC.2009.5199541","url":"https://dblp.org/rec/conf/icc/BlomerJ09"}, "url":"URL#5146370" }, { "@score":"1", "@id":"5146371", "info":{"authors":{"author":[{"@pid":"39/3615","text":"Holger Boche"},{"@pid":"83/1931","text":"Martin Schubert"}]},"title":"A Unified Framework for Interference Modeling for Multi-User Wireless Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BocheS09","doi":"10.1109/ICC.2009.5198686","ee":"https://doi.org/10.1109/ICC.2009.5198686","url":"https://dblp.org/rec/conf/icc/BocheS09"}, "url":"URL#5146371" }, { "@score":"1", "@id":"5146372", "info":{"authors":{"author":[{"@pid":"65/7630","text":"Rajesh M. Bodade"},{"@pid":"39/7796","text":"Sanjay N. Talbar"}]},"title":"Iris Recognition Using Combination of Dual Tree Rotated Complex Wavelet and Dual Tree Complex Wavelet.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BodadeT09","doi":"10.1109/ICC.2009.5305952","ee":"https://doi.org/10.1109/ICC.2009.5305952","url":"https://dblp.org/rec/conf/icc/BodadeT09"}, "url":"URL#5146372" }, { "@score":"1", "@id":"5146373", "info":{"authors":{"author":[{"@pid":"14/7884","text":"Chad Bohannan"},{"@pid":"89/5992-129","text":"Li Zhang 0129"},{"@pid":"181/2667-8","text":"Jian Tang 0008"},{"@pid":"39/2509","text":"Richard S. Wolff"},{"@pid":"74/1192","text":"Shen Wan"},{"@pid":"07/7881","text":"Neeraj Gurdasani"},{"@pid":"80/7881","text":"Doug Galarus"}]},"title":"QoS Enhancement and Performance Evaluation of Ad-Hoc Routing Protocols for Rural Public Safety.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BohannanZTWWGG09","doi":"10.1109/ICC.2009.5199377","ee":"https://doi.org/10.1109/ICC.2009.5199377","url":"https://dblp.org/rec/conf/icc/BohannanZTWWGG09"}, "url":"URL#5146373" }, { "@score":"1", "@id":"5146374", "info":{"authors":{"author":[{"@pid":"47/1541","text":"Raffaele Bolla"},{"@pid":"16/38","text":"Roberto Bruschi"},{"@pid":"89/7545","text":"Andrea Ranieri"}]},"title":"Green Support for PC-Based Software Router: Performance Evaluation and Modeling.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BollaBR09","doi":"10.1109/ICC.2009.5199050","ee":"https://doi.org/10.1109/ICC.2009.5199050","url":"https://dblp.org/rec/conf/icc/BollaBR09"}, "url":"URL#5146374" }, { "@score":"1", "@id":"5146375", "info":{"authors":{"author":[{"@pid":"58/7881","text":"Emilio Bonilla"},{"@pid":"44/5908","text":"Michael Stier"},{"@pid":"05/4039","text":"Saverio Niccolini"},{"@pid":"05/2754","text":"Marcus Brunner"}]},"title":"Automated Real-Time Recommendations for IPTV.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BonillaSNB09","doi":"10.1109/ICC.2009.5305951","ee":"https://doi.org/10.1109/ICC.2009.5305951","url":"https://dblp.org/rec/conf/icc/BonillaSNB09"}, "url":"URL#5146375" }, { "@score":"1", "@id":"5146376", "info":{"authors":{"author":[{"@pid":"b/LBononi","text":"Luciano Bononi"},{"@pid":"71/6270","text":"Lorenzo Donatiello"},{"@pid":"35/4324","text":"Marco Furini"}]},"title":"Real-Time Traffic in Ad-Hoc Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BononiDF09","doi":"10.1109/ICC.2009.5199394","ee":"https://doi.org/10.1109/ICC.2009.5199394","url":"https://dblp.org/rec/conf/icc/BononiDF09"}, "url":"URL#5146376" }, { "@score":"1", "@id":"5146377", "info":{"authors":{"author":[{"@pid":"31/6326","text":"Fatma Bouabdallah"},{"@pid":"01/4742","text":"Nizar Bouabdallah"},{"@pid":"b/RaoufBoutaba","text":"Raouf Boutaba"}]},"title":"Cross-Layer Design for Energy Conservation in Wireless Sensor Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BouabdallahBB09","doi":"10.1109/ICC.2009.5198872","ee":"https://doi.org/10.1109/ICC.2009.5198872","url":"https://dblp.org/rec/conf/icc/BouabdallahBB09"}, "url":"URL#5146377" }, { "@score":"1", "@id":"5146378", "info":{"authors":{"author":[{"@pid":"b/AzzedineBoukerche","text":"Azzedine Boukerche"},{"@pid":"10/330","text":"Regina Borges de Araujo"},{"@pid":"98/4414","text":"Anis Zarrad"}]},"title":"A Dynamic Ultrapeers Selection Policy for Collaborative Virtual Environments over Mobile Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BoukercheAZ09","doi":"10.1109/ICC.2009.5305954","ee":"https://doi.org/10.1109/ICC.2009.5305954","url":"https://dblp.org/rec/conf/icc/BoukercheAZ09"}, "url":"URL#5146378" }, { "@score":"1", "@id":"5146379", "info":{"authors":{"author":[{"@pid":"b/AzzedineBoukerche","text":"Azzedine Boukerche"},{"@pid":"31/5841","text":"Raed Jarrar"},{"@pid":"44/164","text":"Richard Werner Nelem Pazzi"}]},"title":"A Novel Interactive Streaming Protocol for Image-Based 3D Virtual Environment Navigation.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BoukercheJP09","doi":"10.1109/ICC.2009.5198649","ee":"https://doi.org/10.1109/ICC.2009.5198649","url":"https://dblp.org/rec/conf/icc/BoukercheJP09"}, "url":"URL#5146379" }, { "@score":"1", "@id":"5146380", "info":{"authors":{"author":[{"@pid":"b/AzzedineBoukerche","text":"Azzedine Boukerche"},{"@pid":"61/3222","text":"Cristiano G. Rezende"},{"@pid":"44/164","text":"Richard Werner Nelem Pazzi"}]},"title":"A Link-Reliability-Based Approach to Providing QoS Support for VANETs.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BoukercheRP09","doi":"10.1109/ICC.2009.5198623","ee":"https://doi.org/10.1109/ICC.2009.5198623","url":"https://dblp.org/rec/conf/icc/BoukercheRP09"}, "url":"URL#5146380" }, { "@score":"1", "@id":"5146381", "info":{"authors":{"author":[{"@pid":"32/5717","text":"A. Judson Braga"},{"@pid":"69/5518","text":"Camillo Gentile"}]},"title":"An Ultra-Wideband Radar System for Through-the-Wall Imaging Using a Mobile Robot.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BragaG09","doi":"10.1109/ICC.2009.5198740","ee":"https://doi.org/10.1109/ICC.2009.5198740","url":"https://dblp.org/rec/conf/icc/BragaG09"}, "url":"URL#5146381" }, { "@score":"1", "@id":"5146382", "info":{"authors":{"author":[{"@pid":"16/6636","text":"Felix Brah"},{"@pid":"v/LucVandendorpe","text":"Luc Vandendorpe"}]},"title":"Constrained Ergodic Rates Maximization for Mobile WiMAX with Statistical Channel Information.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BrahV09","doi":"10.1109/ICC.2009.5198847","ee":"https://doi.org/10.1109/ICC.2009.5198847","url":"https://dblp.org/rec/conf/icc/BrahV09"}, "url":"URL#5146382" }, { "@score":"1", "@id":"5146383", "info":{"authors":{"author":[{"@pid":"38/1158","text":"Johannes Brehmer"},{"@pid":"34/5115","text":"Wolfgang Utschick"}]},"title":"Utility Maximization in the Multi-User MISO Downlink with Linear Precoding.","venue":"ICC","pages":"1","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BrehmerU09","doi":"10.1109/ICC.2009.5199561","ee":"https://doi.org/10.1109/ICC.2009.5199561","url":"https://dblp.org/rec/conf/icc/BrehmerU09"}, "url":"URL#5146383" }, { "@score":"1", "@id":"5146384", "info":{"authors":{"author":[{"@pid":"63/1725","text":"Julien Bringer"},{"@pid":"96/4528","text":"Hervé Chabanne"},{"@pid":"71/5259","text":"Bruno Kindarji"}]},"title":"Error-Tolerant Searchable Encryption.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BringerCK09","doi":"10.1109/ICC.2009.5199004","ee":"https://doi.org/10.1109/ICC.2009.5199004","url":"https://dblp.org/rec/conf/icc/BringerCK09"}, "url":"URL#5146384" }, { "@score":"1", "@id":"5146385", "info":{"authors":{"author":[{"@pid":"42/6655","text":"Michael Brinkmeier"},{"@pid":"91/2886","text":"Michael Rossberg"},{"@pid":"64/4710","text":"Guenter Schaefer"}]},"title":"Towards a Denial-of-Service Resilient Design of Complex IPsec Overlays.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BrinkmeierRS09","doi":"10.1109/ICC.2009.5199533","ee":"https://doi.org/10.1109/ICC.2009.5199533","url":"https://dblp.org/rec/conf/icc/BrinkmeierRS09"}, "url":"URL#5146385" }, { "@score":"1", "@id":"5146386", "info":{"authors":{"author":[{"@pid":"b/JoseCarlosBrustoloni","text":"José Carlos Brustoloni"},{"@pid":"75/7398","text":"Nicholas L. Farnan"},{"@pid":"64/6926","text":"Ricardo Villamarín-Salomón"},{"@pid":"91/4029","text":"David Kyle"}]},"title":"Efficient Detection of Bots in Subscribers' Computers.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BrustoloniFVK09","doi":"10.1109/ICC.2009.5198970","ee":"https://doi.org/10.1109/ICC.2009.5198970","url":"https://dblp.org/rec/conf/icc/BrustoloniFVK09"}, "url":"URL#5146386" }, { "@score":"1", "@id":"5146387", "info":{"authors":{"author":[{"@pid":"66/310","text":"Lukasz Budzisz"},{"@pid":"41/2019","text":"Ramon Ferrús"},{"@pid":"18/7258","text":"Ferran Casadevall"},{"@pid":"60/7883","text":"Paul Amer"}]},"title":"On Concurrent Multipath Transfer in SCTP-Based Handover Scenarios.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BudziszFCA09","doi":"10.1109/ICC.2009.5199237","ee":"https://doi.org/10.1109/ICC.2009.5199237","url":"https://dblp.org/rec/conf/icc/BudziszFCA09"}, "url":"URL#5146387" }, { "@score":"1", "@id":"5146388", "info":{"authors":{"author":[{"@pid":"b/JohnFBuford","text":"John F. Buford"},{"@pid":"28/4394","text":"Xiaotao Wu"},{"@pid":"22/3250","text":"Venkatesh Krishnaswamy"}]},"title":"Spatial-Temporal Event Correlation.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BufordWK09","doi":"10.1109/ICC.2009.5199474","ee":"https://doi.org/10.1109/ICC.2009.5199474","url":"https://dblp.org/rec/conf/icc/BufordWK09"}, "url":"URL#5146388" }, { "@score":"1", "@id":"5146389", "info":{"authors":{"author":[{"@pid":"26/7389","text":"Vibhav Bukkapatanam"},{"@pid":"63/3408","text":"A. Antony Franklin"},{"@pid":"78/4000","text":"C. Siva Ram Murthy"}]},"title":"Using Partially Overlapped Channels for End-to-End Flow Allocation and Channel Assignment in Wireless Mesh Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BukkapatanamFM09","doi":"10.1109/ICC.2009.5199559","ee":"https://doi.org/10.1109/ICC.2009.5199559","url":"https://dblp.org/rec/conf/icc/BukkapatanamFM09"}, "url":"URL#5146389" }, { "@score":"1", "@id":"5146390", "info":{"authors":{"author":[{"@pid":"53/3314","text":"T. Ryan Burchfield"},{"@pid":"52/4763","text":"Ehsan Nourbakhsh"},{"@pid":"26/7541","text":"Jeff Dix"},{"@pid":"22/7882","text":"Kunal Sahu"},{"@pid":"43/5587-1","text":"S. Venkatesan 0001"},{"@pid":"p/RaviPrakash","text":"Ravi Prakash 0001"}]},"title":"RF in the Jungle: Effect of Environment Assumptions on Wireless Experiment Repeatability.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BurchfieldNDSVP09","doi":"10.1109/ICC.2009.5199421","ee":"https://doi.org/10.1109/ICC.2009.5199421","url":"https://dblp.org/rec/conf/icc/BurchfieldNDSVP09"}, "url":"URL#5146390" }, { "@score":"1", "@id":"5146391", "info":{"authors":{"author":[{"@pid":"75/5795","text":"Wolfgang Bziuk"},{"@pid":"65/3033","text":"Said Zaghloul"},{"@pid":"30/1610","text":"Admela Jukan"}]},"title":"The Spatial Effect of Mobility on the Mean Number of Handoffs: A New Theoretical Result.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/BziukZJ09","doi":"10.1109/ICC.2009.5199518","ee":"https://doi.org/10.1109/ICC.2009.5199518","url":"https://dblp.org/rec/conf/icc/BziukZJ09"}, "url":"URL#5146391" }, { "@score":"1", "@id":"5146392", "info":{"authors":{"author":[{"@pid":"42/2223","text":"Albert Cabellos-Aparicio"},{"@pid":"79/5634","text":"Rubén Cuevas Rumín"},{"@pid":"91/1044","text":"Jordi Domingo-Pascual"},{"@pid":"76/4893","text":"Ángel Cuevas"},{"@pid":"65/28","text":"Carmen Guerrero"}]},"title":"fP2P-HN: A P2P-Based Route Optimization Solution for Mobile IP and NEMO Clients.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Cabellos-AparicioRDCG09","doi":"10.1109/ICC.2009.5199036","ee":"https://doi.org/10.1109/ICC.2009.5199036","url":"https://dblp.org/rec/conf/icc/Cabellos-AparicioRDCG09"}, "url":"URL#5146392" }, { "@score":"1", "@id":"5146393", "info":{"authors":{"author":[{"@pid":"33/7882","text":"Albeiro Cortés Cabezas"},{"@pid":"23/7884","text":"Ricardo Gamboa Medina"},{"@pid":"45/2410","text":"Néstor M. Peña"},{"@pid":"66/1936","text":"Miguel A. Labrador"}]},"title":"Low Energy and Low Latency in Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CabezasMPL09","doi":"10.1109/ICC.2009.5199156","ee":"https://doi.org/10.1109/ICC.2009.5199156","url":"https://dblp.org/rec/conf/icc/CabezasMPL09"}, "url":"URL#5146393" }, { "@score":"1", "@id":"5146394", "info":{"authors":{"author":[{"@pid":"72/3887-1","text":"Jun Cai 0001"},{"@pid":"13/3949","text":"Attahiru Sule Alfa"}]},"title":"Optimal Channel Sensing in Wireless Communication Networks with Cognitive Radio.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CaiA09","doi":"10.1109/ICC.2009.5199277","ee":"https://doi.org/10.1109/ICC.2009.5199277","url":"https://dblp.org/rec/conf/icc/CaiA09"}, "url":"URL#5146394" }, { "@score":"1", "@id":"5146395", "info":{"authors":{"author":[{"@pid":"60/3060-2","text":"Yan Cai 0002"},{"@pid":"79/7373","text":"Y. Sinan Hanay"},{"@pid":"10/5241","text":"Tilman Wolf"}]},"title":"Practical Packet Pacing in Small-Buffer Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CaiHW09","doi":"10.1109/ICC.2009.5199356","ee":"https://doi.org/10.1109/ICC.2009.5199356","url":"https://dblp.org/rec/conf/icc/CaiHW09"}, "url":"URL#5146395" }, { "@score":"1", "@id":"5146396", "info":{"authors":{"author":[{"@pid":"03/7051","text":"Yunlong Cai"},{"@pid":"98/6670","text":"Rodrigo C. de Lamare"},{"@pid":"28/215","text":"Rui Fa"}]},"title":"Novel Switched Interleaving Techniques with Limited Feedback for DS-CDMA Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CaiLF09","doi":"10.1109/ICC.2009.5199228","ee":"https://doi.org/10.1109/ICC.2009.5199228","url":"https://dblp.org/rec/conf/icc/CaiLF09"}, "url":"URL#5146396" }, { "@score":"1", "@id":"5146397", "info":{"authors":{"author":[{"@pid":"26/7883","text":"Yueping Cai"},{"@pid":"72/1700","text":"Eiji Oki"},{"@pid":"16/7884","text":"Motoharu Matsuura"},{"@pid":"94/7883","text":"Naoto Kishi"},{"@pid":"57/5158","text":"Tetsuya Miki"}]},"title":"Optical Broadcast-and-Select Network Architecture with Centralized Multi-Carrier Light Source.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CaiOMKM09","doi":"10.1109/ICC.2009.5199275","ee":"https://doi.org/10.1109/ICC.2009.5199275","url":"https://dblp.org/rec/conf/icc/CaiOMKM09"}, "url":"URL#5146397" }, { "@score":"1", "@id":"5146398", "info":{"authors":{"author":[{"@pid":"55/5021","text":"Carlo Caini"},{"@pid":"31/6842","text":"Rosario Firrincieli"},{"@pid":"47/680","text":"Daniele Lacamera"}]},"title":"Comparative Performance Evaluation of TCP Variants on Satellite Environments.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CainiFL09","doi":"10.1109/ICC.2009.5198834","ee":"https://doi.org/10.1109/ICC.2009.5198834","url":"https://dblp.org/rec/conf/icc/CainiFL09"}, "url":"URL#5146398" }, { "@score":"1", "@id":"5146399", "info":{"authors":{"author":[{"@pid":"75/7882","text":"Telvis E. Calhoun"},{"@pid":"90/5845","text":"Reed Newman"},{"@pid":"12/6354","text":"Raheem A. Beyah"}]},"title":"Authentication in 802.11 LANs Using a Covert Side Channel.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CalhounNB09","doi":"10.1109/ICC.2009.5198769","ee":"https://doi.org/10.1109/ICC.2009.5198769","url":"https://dblp.org/rec/conf/icc/CalhounNB09"}, "url":"URL#5146399" }, { "@score":"1", "@id":"5146400", "info":{"authors":{"author":[{"@pid":"42/3320","text":"Christian Callegari"},{"@pid":"80/6788","text":"Stefano Giordano"},{"@pid":"04/374","text":"Michele Pagano"}]},"title":"On the Use of Compression Algorithms for Network Anomaly Detection.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CallegariGP09","doi":"10.1109/ICC.2009.5199270","ee":"https://doi.org/10.1109/ICC.2009.5199270","url":"https://dblp.org/rec/conf/icc/CallegariGP09"}, "url":"URL#5146400" }, { "@score":"1", "@id":"5146401", "info":{"authors":{"author":[{"@pid":"35/2736","text":"Alfonso Camargo"},{"@pid":"04/4251","text":"Dachuan Yao"},{"@pid":"45/1436","text":"Andreas Czylwik"}]},"title":"Bandwidth Efficiency of Practical MIMO-OFDM Systems with Adaptive MIMO Schemes.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CamargoYC09","doi":"10.1109/ICC.2009.5198776","ee":"https://doi.org/10.1109/ICC.2009.5198776","url":"https://dblp.org/rec/conf/icc/CamargoYC09"}, "url":"URL#5146401" }, { "@score":"1", "@id":"5146402", "info":{"authors":{"author":[{"@pid":"12/1630","text":"Rui Campos"},{"@pid":"68/1435","text":"Manuel Ricardo 0001"}]},"title":"A New Efficient Mechanism for Establishing IP Connectivity between Ambient Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CamposR09","doi":"10.1109/ICC.2009.5198639","ee":"https://doi.org/10.1109/ICC.2009.5198639","url":"https://dblp.org/rec/conf/icc/CamposR09"}, "url":"URL#5146402" }, { "@score":"1", "@id":"5146403", "info":{"authors":{"author":[{"@pid":"03/2848","text":"Turkmen Canli"},{"@pid":"k/AshfaqAKhokhar","text":"Ashfaq A. Khokhar"}]},"title":"PRMAC: Pipelined Routing Enhanced MAC Protocol for Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CanliK09","doi":"10.1109/ICC.2009.5199364","ee":"https://doi.org/10.1109/ICC.2009.5199364","url":"https://dblp.org/rec/conf/icc/CanliK09"}, "url":"URL#5146403" }, { "@score":"1", "@id":"5146404", "info":{"authors":{"author":[{"@pid":"53/1833","text":"Le Cao"},{"@pid":"12/512","text":"Pooi Yuen Kam"},{"@pid":"85/4712","text":"Meixia Tao"}]},"title":"Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CaoKT09","doi":"10.1109/ICC.2009.5199066","ee":"https://doi.org/10.1109/ICC.2009.5199066","url":"https://dblp.org/rec/conf/icc/CaoKT09"}, "url":"URL#5146404" }, { "@score":"1", "@id":"5146405", "info":{"authors":{"author":[{"@pid":"54/6265-1","text":"Wei Cao 0001"},{"@pid":"52/323","text":"Qi Zhang"},{"@pid":"33/2397","text":"Arumugam Nallanathan"},{"@pid":"09/336","text":"Hari Krishna Garg"}]},"title":"A Novel High Data Rate Prerake UWB System Using Orthogonal Codes and Chip-Interleaving.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CaoZNG09","doi":"10.1109/ICC.2009.5198648","ee":"https://doi.org/10.1109/ICC.2009.5198648","url":"https://dblp.org/rec/conf/icc/CaoZNG09"}, "url":"URL#5146405" }, { "@score":"1", "@id":"5146406", "info":{"authors":{"author":[{"@pid":"22/808","text":"Gérard Chalhoub"},{"@pid":"71/7718","text":"Nassima Hadid"},{"@pid":"81/6619","text":"Alexandre Guitton"},{"@pid":"02/7030","text":"Michel Misson"}]},"title":"Deference Mechanisms Significantly Increase the MAC Delay of Slotted CSMA/CA.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChalhoubHGM09","doi":"10.1109/ICC.2009.5198886","ee":"https://doi.org/10.1109/ICC.2009.5198886","url":"https://dblp.org/rec/conf/icc/ChalhoubHGM09"}, "url":"URL#5146406" }, { "@score":"1", "@id":"5146407", "info":{"authors":{"author":{"@pid":"13/2302","text":"Aldar Chun-fai Chan"}},"title":"Symmetric-Key Homomorphic Encryption for Encrypted Data Processing.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Chan09","doi":"10.1109/ICC.2009.5199505","ee":"https://doi.org/10.1109/ICC.2009.5199505","url":"https://dblp.org/rec/conf/icc/Chan09"}, "url":"URL#5146407" }, { "@score":"1", "@id":"5146408", "info":{"authors":{"author":[{"@pid":"57/4465","text":"Deepthi Chander"},{"@pid":"52/7630","text":"Bhushan G. Jagyasi"},{"@pid":"57/3280","text":"Uday B. Desai"},{"@pid":"m/SNMerchant","text":"S. N. Merchant"}]},"title":"DVD Based Moving Event Localization in Multihop Cellular Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChanderJDM09","doi":"10.1109/ICC.2009.5198952","ee":"https://doi.org/10.1109/ICC.2009.5198952","url":"https://dblp.org/rec/conf/icc/ChanderJDM09"}, "url":"URL#5146408" }, { "@score":"1", "@id":"5146409", "info":{"authors":{"author":[{"@pid":"54/3777","text":"Chih-Yung Chang"},{"@pid":"43/5437","text":"Chao-Tsun Chang"},{"@pid":"23/1401","text":"Ming-Hsien Li"},{"@pid":"06/7881","text":"Chun-Hung Chang"}]},"title":"A Novel Relay Placement Mechanism for Capacity Enhancement in IEEE 802.16j WiMAX Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChangCLC09","doi":"10.1109/ICC.2009.5198653","ee":"https://doi.org/10.1109/ICC.2009.5198653","url":"https://dblp.org/rec/conf/icc/ChangCLC09"}, "url":"URL#5146409" }, { "@score":"1", "@id":"5146410", "info":{"authors":{"author":[{"@pid":"75/577","text":"Yao-Tang Chang"},{"@pid":"61/3076","text":"Jen-Fa Huang"},{"@pid":"61/7881","text":"Li-Wei Chou"},{"@pid":"32/7884","text":"Kuan-Ju Wang"}]},"title":"Waveguide-Grating-Routers-Based Realization of Time-Spreading and Wavelength-Group-Hopping over Fiber-to-the-Home Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChangHCW09","doi":"10.1109/ICC.2009.5199571","ee":"https://doi.org/10.1109/ICC.2009.5199571","url":"https://dblp.org/rec/conf/icc/ChangHCW09"}, "url":"URL#5146410" }, { "@score":"1", "@id":"5146411", "info":{"authors":{"author":[{"@pid":"48/2522","text":"Chia-Hung Chang"},{"@pid":"10/3222","text":"Wanjiun Liao"}]},"title":"Revisiting Relative Location Estimation in Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChangL09","doi":"10.1109/ICC.2009.5199419","ee":"https://doi.org/10.1109/ICC.2009.5199419","url":"https://dblp.org/rec/conf/icc/ChangL09"}, "url":"URL#5146411" }, { "@score":"1", "@id":"5146412", "info":{"authors":{"author":[{"@pid":"68/7882","text":"Jin-Jia Chang"},{"@pid":"10/3222","text":"Wanjiun Liao"},{"@pid":"42/4302","text":"Ting-Chao Hou"}]},"title":"Reservation-Based Directional Medium Access Control (RDMAC) Protocol for Multi-Hop Wireless Networks with Directional Antennas.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChangLH09","doi":"10.1109/ICC.2009.5199410","ee":"https://doi.org/10.1109/ICC.2009.5199410","url":"https://dblp.org/rec/conf/icc/ChangLH09"}, "url":"URL#5146412" }, { "@score":"1", "@id":"5146413", "info":{"authors":{"author":[{"@pid":"43/7884","text":"Ronald Y. Chang"},{"@pid":"60/664","text":"Zhifeng Tao"},{"@pid":"60/3446","text":"Jinyun Zhang"},{"@pid":"k/CCJayKuo","text":"C.-C. Jay Kuo"}]},"title":"A Graph Approach to Dynamic Fractional Frequency Reuse (FFR) in Multi-Cell OFDMA Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChangTZK09","doi":"10.1109/ICC.2009.5198612","ee":"https://doi.org/10.1109/ICC.2009.5198612","url":"https://dblp.org/rec/conf/icc/ChangTZK09"}, "url":"URL#5146413" }, { "@score":"1", "@id":"5146414", "info":{"authors":{"author":[{"@pid":"41/4948","text":"Mohamad Charafeddine"},{"@pid":"83/514","text":"Zhu Han 0001"},{"@pid":"p/ArogyaswamiPaulraj","text":"Arogyaswami Paulraj"},{"@pid":"40/1964","text":"John M. Cioffi"}]},"title":"Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CharafeddineHPC09","doi":"10.1109/ICC.2009.5198878","ee":"https://doi.org/10.1109/ICC.2009.5198878","url":"https://dblp.org/rec/conf/icc/CharafeddineHPC09"}, "url":"URL#5146414" }, { "@score":"1", "@id":"5146415", "info":{"authors":{"author":[{"@pid":"56/1794","text":"Madhumita Chatterjee"},{"@pid":"89/2818","text":"G. Sivakumar"},{"@pid":"11/7009","text":"Bernard Menezes"}]},"title":"Dynamic Policy Based Model for Trust Based Access Control in P2P Applications.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChatterjeeSM09","doi":"10.1109/ICC.2009.5198957","ee":"https://doi.org/10.1109/ICC.2009.5198957","url":"https://dblp.org/rec/conf/icc/ChatterjeeSM09"}, "url":"URL#5146415" }, { "@score":"1", "@id":"5146416", "info":{"authors":{"author":[{"@pid":"44/3536","text":"Nestor D. Chatzidiamantis"},{"@pid":"52/6842","text":"Murat Uysal"},{"@pid":"45/2826","text":"Theodoros A. Tsiftsis"},{"@pid":"13/5195","text":"George K. Karagiannidis"}]},"title":"EM-Based Maximum-Likelihood Sequence Detection for MIMO Optical Wireless Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChatzidiamantisUTK09","doi":"10.1109/ICC.2009.5198982","ee":"https://doi.org/10.1109/ICC.2009.5198982","url":"https://dblp.org/rec/conf/icc/ChatzidiamantisUTK09"}, "url":"URL#5146416" }, { "@score":"1", "@id":"5146417", "info":{"authors":{"author":[{"@pid":"57/4418","text":"Symeon Chatzinotas"},{"@pid":"25/1002","text":"Muhammad Ali Imran 0001"},{"@pid":"08/6048","text":"Reza Hoshyar"}]},"title":"The Multicell Processing Capacity of the Cellular MIMO Uplink Channel under Correlated Fading.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChatzinotasIH09","doi":"10.1109/ICC.2009.5199517","ee":"https://doi.org/10.1109/ICC.2009.5199517","url":"https://dblp.org/rec/conf/icc/ChatzinotasIH09"}, "url":"URL#5146417" }, { "@score":"1", "@id":"5146418", "info":{"authors":{"author":[{"@pid":"47/3836","text":"Qasim M. Chaudhari"},{"@pid":"22/4717","text":"Erchin Serpedin"},{"@pid":"83/3361","text":"Yik-Chung Wu"}]},"title":"Improved Estimation of Clock Offset in Sensor Networks.","venue":"ICC","pages":"1-4","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChaudhariSW09","doi":"10.1109/ICC.2009.5199072","ee":"https://doi.org/10.1109/ICC.2009.5199072","url":"https://dblp.org/rec/conf/icc/ChaudhariSW09"}, "url":"URL#5146418" }, { "@score":"1", "@id":"5146419", "info":{"authors":{"author":[{"@pid":"93/4847-1","text":"Yunfei Chen 0001"},{"@pid":"62/6601","text":"Norman C. Beaulieu"}]},"title":"Superior NDA ML Delay and Gain Estimators for UWB Channels.","venue":"ICC","pages":"1-4","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChenB09","doi":"10.1109/ICC.2009.5199499","ee":"https://doi.org/10.1109/ICC.2009.5199499","url":"https://dblp.org/rec/conf/icc/ChenB09"}, "url":"URL#5146419" }, { "@score":"1", "@id":"5146420", "info":{"authors":{"author":[{"@pid":"76/7883","text":"Ian Y. Chen"},{"@pid":"23/1989","text":"Woon Hau Chin"}]},"title":"Channel Spectral Flattening in Time Domain Equalizer Design for OFDM Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChenC09","doi":"10.1109/ICC.2009.5198821","ee":"https://doi.org/10.1109/ICC.2009.5198821","url":"https://dblp.org/rec/conf/icc/ChenC09"}, "url":"URL#5146420" }, { "@score":"1", "@id":"5146421", "info":{"authors":{"author":[{"@pid":"15/5182","text":"Ming-Yang Chen"},{"@pid":"40/1964","text":"John M. Cioffi"}]},"title":"Space-Time Block Codes with Symbol-by-Symbol Maximum Likelihood Detections.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChenC09a","doi":"10.1109/ICC.2009.5199468","ee":"https://doi.org/10.1109/ICC.2009.5199468","url":"https://dblp.org/rec/conf/icc/ChenC09a"}, "url":"URL#5146421" }, { "@score":"1", "@id":"5146422", "info":{"authors":{"author":[{"@pid":"55/2484-1","text":"Jiming Chen 0001"},{"@pid":"42/7884","text":"Kejie Cao"},{"@pid":"40/4160","text":"Youxian Sun"},{"@pid":"s/XueminShen","text":"Xuemin (Sherman) Shen"}]},"title":"Adaptive Sensor Activation for Target Tracking in Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChenCSS09","doi":"10.1109/ICC.2009.5198708","ee":"https://doi.org/10.1109/ICC.2009.5198708","url":"https://dblp.org/rec/conf/icc/ChenCSS09"}, "url":"URL#5146422" }, { "@score":"1", "@id":"5146423", "info":{"authors":{"author":[{"@pid":"80/6074","text":"Lanxiang Chen"},{"@pid":"48/5939-1","text":"Dan Feng 0001"},{"@pid":"27/1620-1","text":"Zhan Shi 0001"},{"@pid":"21/6430","text":"Feng Zhou"}]},"title":"Using Session Identifiers as Authentication Tokens.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChenFSZ09","doi":"10.1109/ICC.2009.5199560","ee":"https://doi.org/10.1109/ICC.2009.5199560","url":"https://dblp.org/rec/conf/icc/ChenFSZ09"}, "url":"URL#5146423" }, { "@score":"1", "@id":"5146424", "info":{"authors":{"author":[{"@pid":"01/5394","text":"Liang Chen"},{"@pid":"54/2451","text":"Brian S. Krongold"},{"@pid":"84/3479","text":"Jamie S. Evans"}]},"title":"Performance Evaluation of Optical OFDM Systems with Nonlinear Clipping Distortion.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChenKE09","doi":"10.1109/ICC.2009.5199325","ee":"https://doi.org/10.1109/ICC.2009.5199325","url":"https://dblp.org/rec/conf/icc/ChenKE09"}, "url":"URL#5146424" }, { "@score":"1", "@id":"5146425", "info":{"authors":{"author":[{"@pid":"20/5211","text":"Zhijia Chen"},{"@pid":"50/3402-1","text":"Bo Li 0001"},{"@pid":"14/3860","text":"Gabriel Yik Keung"},{"@pid":"21/760","text":"Hao Yin"},{"@pid":"53/2571-2","text":"Chuang Lin 0002"},{"@pid":"65/5018","text":"Yuanzhuo Wang"}]},"title":"How Scalable Could P2P Live Media Streaming System Be with the Stringent Time Constraint?","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChenLKYLW09","doi":"10.1109/ICC.2009.5199057","ee":"https://doi.org/10.1109/ICC.2009.5199057","url":"https://dblp.org/rec/conf/icc/ChenLKYLW09"}, "url":"URL#5146425" }, { "@score":"1", "@id":"5146426", "info":{"authors":{"author":[{"@pid":"43/7882","text":"I-Wei Chen"},{"@pid":"79/591","text":"Po-Ching Lin"},{"@pid":"82/7882","text":"Chi-Chung Luo"},{"@pid":"01/7881","text":"Tsung-Huan Cheng"},{"@pid":"l/YingDarLin","text":"Ying-Dar Lin"},{"@pid":"12/2250","text":"Yuan-Cheng Lai"},{"@pid":"62/3965","text":"Frank C. Lin"}]},"title":"Extracting Attack Sessions from Real Traffic with Intrusion Prevention Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChenLLCLLL09","doi":"10.1109/ICC.2009.5199022","ee":"https://doi.org/10.1109/ICC.2009.5199022","url":"https://dblp.org/rec/conf/icc/ChenLLCLLL09"}, "url":"URL#5146426" }, { "@score":"1", "@id":"5146427", "info":{"authors":{"author":[{"@pid":"50/6996-3","text":"Min Chen 0003"},{"@pid":"36/4847","text":"Victor C. M. Leung"},{"@pid":"52/3003","text":"Shiwen Mao"},{"@pid":"14/2293-2","text":"Taekyoung Kwon 0002"},{"@pid":"l/MingLi7","text":"Ming Li 0007"}]},"title":"Energy-Efficient Itinerary Planning for Mobile Agents in Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChenLMKL09","doi":"10.1109/ICC.2009.5198997","ee":"https://doi.org/10.1109/ICC.2009.5198997","url":"https://dblp.org/rec/conf/icc/ChenLMKL09"}, "url":"URL#5146427" }, { "@score":"1", "@id":"5146428", "info":{"authors":{"author":[{"@pid":"93/2896","text":"Lydia Yiyu Chen"},{"@pid":"98/5305","text":"Michela Meo"},{"@pid":"21/2172","text":"Alessandra Scicchitano"}]},"title":"Caching Video Contents in IPTV Systems with Hierarchical Architecture.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChenMS09","doi":"10.1109/ICC.2009.5198800","ee":"https://doi.org/10.1109/ICC.2009.5198800","url":"https://dblp.org/rec/conf/icc/ChenMS09"}, "url":"URL#5146428" }, { "@score":"1", "@id":"5146429", "info":{"authors":{"author":[{"@pid":"66/3019-1","text":"Chao Chen 0001"},{"@pid":"47/3176","text":"Carlos A. Pomalaza-Raez"},{"@pid":"46/7882","text":"M. Colone"},{"@pid":"71/3286","text":"Robert Martin"},{"@pid":"75/6485","text":"Jim Isaacs"}]},"title":"Modeling of a Public Safety Communication System for Emergency Response.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChenPCMI09","doi":"10.1109/ICC.2009.5199192","ee":"https://doi.org/10.1109/ICC.2009.5199192","url":"https://dblp.org/rec/conf/icc/ChenPCMI09"}, "url":"URL#5146429" }, { "@score":"1", "@id":"5146430", "info":{"authors":{"author":[{"@pid":"34/6641","text":"Harry Z. B. Chen"},{"@pid":"95/2265","text":"Robert Schober"},{"@pid":"57/5273","text":"Wolfgang H. Gerstacker"}]},"title":"Robust Cyclic Space-Frequency Filtering for BICM-OFDM with Outdated CSIT.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChenSG09","doi":"10.1109/ICC.2009.5199423","ee":"https://doi.org/10.1109/ICC.2009.5199423","url":"https://dblp.org/rec/conf/icc/ChenSG09"}, "url":"URL#5146430" }, { "@score":"1", "@id":"5146431", "info":{"authors":{"author":[{"@pid":"65/7882","text":"Zengmao Chen"},{"@pid":"74/6270","text":"Sergiy A. Vorobyov"},{"@pid":"75/2596","text":"Cheng-Xiang Wang 0001"},{"@pid":"13/6830","text":"John S. Thompson"}]},"title":"Nash Bargaining over MIMO Interference Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChenVWT09","doi":"10.1109/ICC.2009.5199213","ee":"https://doi.org/10.1109/ICC.2009.5199213","url":"https://dblp.org/rec/conf/icc/ChenVWT09"}, "url":"URL#5146431" }, { "@score":"1", "@id":"5146432", "info":{"authors":{"author":[{"@pid":"70/4001","text":"Shuping Chen"},{"@pid":"28/4847","text":"Wenbo Wang 0007"},{"@pid":"52/5264-1","text":"Xing Zhang 0001"}]},"title":"Asymptotic Analysis of Multiuser Diversity and Selection Diversity in Multiple-Relay Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChenWZ09","doi":"10.1109/ICC.2009.5198766","ee":"https://doi.org/10.1109/ICC.2009.5198766","url":"https://dblp.org/rec/conf/icc/ChenWZ09"}, "url":"URL#5146432" }, { "@score":"1", "@id":"5146433", "info":{"authors":{"author":[{"@pid":"32/3685","text":"Jianwen Chen"},{"@pid":"97/6505-45","text":"Qing Wang 0045"},{"@pid":"45/4920","text":"Zhenbo Zhu"},{"@pid":"95/9301","text":"Yonghua Lin"}]},"title":"An Efficient Software Radio Framework for WiMAX Physical Layer on Cell Multicore Platform.","venue":"ICC","pages":"1-4","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChenWZL09","doi":"10.1109/ICC.2009.5305938","ee":"https://doi.org/10.1109/ICC.2009.5305938","url":"https://dblp.org/rec/conf/icc/ChenWZL09"}, "url":"URL#5146433" }, { "@score":"1", "@id":"5146434", "info":{"authors":{"author":[{"@pid":"50/6996-17","text":"Min Chen 0017"},{"@pid":"y/AylinYener","text":"Aylin Yener"}]},"title":"Power Allocation for Multi-Access Two-Way Relaying.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChenY09","doi":"10.1109/ICC.2009.5199348","ee":"https://doi.org/10.1109/ICC.2009.5199348","url":"https://dblp.org/rec/conf/icc/ChenY09"}, "url":"URL#5146434" }, { "@score":"1", "@id":"5146435", "info":{"authors":{"author":[{"@pid":"55/5665","text":"Kai-Wen Cheng"},{"@pid":"81/797","text":"Jyh-Cheng Chen"}]},"title":"Dynamic Pre-Allocation HARQ (DP-HARQ) in IEEE 802.16j Mobile Multihop Relay (MMR).","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChengC09","doi":"10.1109/ICC.2009.5198958","ee":"https://doi.org/10.1109/ICC.2009.5198958","url":"https://dblp.org/rec/conf/icc/ChengC09"}, "url":"URL#5146435" }, { "@score":"1", "@id":"5146436", "info":{"authors":{"author":[{"@pid":"88/4619","text":"Maggie X. Cheng"},{"@pid":"56/2757","text":"Xuan Gong"},{"@pid":"47/1295","text":"Scott C.-H. Huang"}]},"title":"Improving Sensor Network Lifetime Through Hierarchical Multihop Clustering.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChengGH09","doi":"10.1109/ICC.2009.5199078","ee":"https://doi.org/10.1109/ICC.2009.5199078","url":"https://dblp.org/rec/conf/icc/ChengGH09"}, "url":"URL#5146436" }, { "@score":"1", "@id":"5146437", "info":{"authors":{"author":[{"@pid":"29/1059-1","text":"Xiang Cheng 0001"},{"@pid":"75/2596","text":"Cheng-Xiang Wang 0001"},{"@pid":"52/5184","text":"David I. Laurenson"}]},"title":"Multiple-Ring Based Modeling and Simulation of Wideband Space-Time-Frequency MIMO Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChengWL09","doi":"10.1109/ICC.2009.5199206","ee":"https://doi.org/10.1109/ICC.2009.5199206","url":"https://dblp.org/rec/conf/icc/ChengWL09"}, "url":"URL#5146437" }, { "@score":"1", "@id":"5146438", "info":{"authors":{"author":[{"@pid":"29/1059-1","text":"Xiang Cheng 0001"},{"@pid":"75/2596","text":"Cheng-Xiang Wang 0001"},{"@pid":"52/5184","text":"David I. Laurenson"},{"@pid":"40/4747","text":"Athanasios V. Vasilakos"}]},"title":"Second Order Statistics of Non-Isotropic Mobile-to-Mobile Ricean Fading Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChengWLV09","doi":"10.1109/ICC.2009.5199438","ee":"https://doi.org/10.1109/ICC.2009.5199438","url":"https://dblp.org/rec/conf/icc/ChengWLV09"}, "url":"URL#5146438" }, { "@score":"1", "@id":"5146439", "info":{"authors":{"author":[{"@pid":"41/7881","text":"Man Hon Cheung"},{"@pid":"68/2208","text":"Amir Hamed Mohsenian Rad"},{"@pid":"54/3080","text":"Vincent W. S. Wong 0001"},{"@pid":"95/2265","text":"Robert Schober"}]},"title":"Random Access Protocols for WLANs Based on Mechanism Design.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CheungRWS09","doi":"10.1109/ICC.2009.5199386","ee":"https://doi.org/10.1109/ICC.2009.5199386","url":"https://dblp.org/rec/conf/icc/CheungRWS09"}, "url":"URL#5146439" }, { "@score":"1", "@id":"5146440", "info":{"authors":{"author":[{"@pid":"54/7881","text":"Luca Chiaraviglio"},{"@pid":"18/6316","text":"Marco Mellia"},{"@pid":"93/4926","text":"Fabio Neri"}]},"title":"Reducing Power Consumption in Backbone Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChiaraviglioMN09","doi":"10.1109/ICC.2009.5199404","ee":"https://doi.org/10.1109/ICC.2009.5199404","url":"https://dblp.org/rec/conf/icc/ChiaraviglioMN09"}, "url":"URL#5146440" }, { "@score":"1", "@id":"5146441", "info":{"authors":{"author":[{"@pid":"09/7869","text":"Kuan-Lin Chiu"},{"@pid":"57/5091","text":"Ren-Hung Hwang"},{"@pid":"30/384","text":"Yuh-Shyan Chen"}]},"title":"A Cross Layer Fast Handover Scheme in VANET.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChiuHC09","doi":"10.1109/ICC.2009.5198587","ee":"https://doi.org/10.1109/ICC.2009.5198587","url":"https://dblp.org/rec/conf/icc/ChiuHC09"}, "url":"URL#5146441" }, { "@score":"1", "@id":"5146442", "info":{"authors":{"author":[{"@pid":"99/7882","text":"Yu-shan Chiu"},{"@pid":"127/2540-1","text":"R. H. Stephen Hardy"},{"@pid":"04/8846","text":"Tejinder S. Randhawa"}]},"title":"A TCP-Driven MAC Resource Allocation Scheme in a WiMAX Network.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChiuHR09","doi":"10.1109/ICC.2009.5198681","ee":"https://doi.org/10.1109/ICC.2009.5198681","url":"https://dblp.org/rec/conf/icc/ChiuHR09"}, "url":"URL#5146442" }, { "@score":"1", "@id":"5146443", "info":{"authors":{"author":[{"@pid":"85/3070","text":"Lin-Kai Chiu"},{"@pid":"65/2173","text":"Sau-Hsuan Wu"}]},"title":"The Modified Bayesian Cramer-Rao Bound for MIMO Channel Tracking.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChiuW09","doi":"10.1109/ICC.2009.5199516","ee":"https://doi.org/10.1109/ICC.2009.5199516","url":"https://dblp.org/rec/conf/icc/ChiuW09"}, "url":"URL#5146443" }, { "@score":"1", "@id":"5146444", "info":{"authors":{"author":[{"@pid":"11/5825","text":"Hon Sun Chiu"},{"@pid":"y/KwanLawrenceYeung","text":"Kwan Lawrence Yeung"},{"@pid":"81/5546","text":"King-Shan Lui"}]},"title":"Bandwidth-Guaranteed Multicast in Multi-Channel Multi-Interface Wireless Mesh Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChiuYL09","doi":"10.1109/ICC.2009.5198777","ee":"https://doi.org/10.1109/ICC.2009.5198777","url":"https://dblp.org/rec/conf/icc/ChiuYL09"}, "url":"URL#5146444" }, { "@score":"1", "@id":"5146445", "info":{"authors":{"author":[{"@pid":"12/7884","text":"Bong Jun Choi 0001"},{"@pid":"s/XueminShen","text":"Xuemin (Sherman) Shen"}]},"title":"Adaptive Exponential Beacon Period Protocol for Power Saving in Delay Tolerant Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChoiS09","doi":"10.1109/ICC.2009.5198700","ee":"https://doi.org/10.1109/ICC.2009.5198700","url":"https://dblp.org/rec/conf/icc/ChoiS09"}, "url":"URL#5146445" }, { "@score":"1", "@id":"5146446", "info":{"authors":{"author":[{"@pid":"77/7883","text":"Chia-Peng Chou"},{"@pid":"39/852-2","text":"Chien-Hsing Wu 0002"},{"@pid":"16/1768","text":"Tsung-Hsien Liu"},{"@pid":"45/4892","text":"Yin-Tsung Hwang"}]},"title":"Space-Frequency-Coded MIMO OFDM Receivers Based on Gaussian Message Passing.","venue":"ICC","pages":"1-4","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChouWLH09","doi":"10.1109/ICC.2009.5199467","ee":"https://doi.org/10.1109/ICC.2009.5199467","url":"https://dblp.org/rec/conf/icc/ChouWLH09"}, "url":"URL#5146446" }, { "@score":"1", "@id":"5146447", "info":{"authors":{"author":[{"@pid":"41/7532","text":"Aakanksha Chowdhery"},{"@pid":"08/5455","text":"Sumanth Jagannathan"},{"@pid":"40/1964","text":"John M. Cioffi"},{"@pid":"96/1488","text":"Meryem Ouzzif"}]},"title":"A Polite Cross-Layer Protocol for Contention-Based Home Power-Line Communications.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChowdheryJCO09","doi":"10.1109/ICC.2009.5198659","ee":"https://doi.org/10.1109/ICC.2009.5198659","url":"https://dblp.org/rec/conf/icc/ChowdheryJCO09"}, "url":"URL#5146447" }, { "@score":"1", "@id":"5146448", "info":{"authors":{"author":[{"@pid":"04/3786","text":"Kaushik R. Chowdhury"},{"@pid":"a/IAAkyildiz","text":"Ian F. Akyildiz"}]},"title":"Interferer Classification, Channel Selection and Transmission Adaptation for Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChowdhuryA09","doi":"10.1109/ICC.2009.5199098","ee":"https://doi.org/10.1109/ICC.2009.5199098","url":"https://dblp.org/rec/conf/icc/ChowdhuryA09"}, "url":"URL#5146448" }, { "@score":"1", "@id":"5146449", "info":{"authors":{"author":[{"@pid":"46/5011","text":"Ayan Roy Chowdhury"},{"@pid":"b/JohnSBaras","text":"John S. Baras"}]},"title":"Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChowdhuryB09","doi":"10.1109/ICC.2009.5199335","ee":"https://doi.org/10.1109/ICC.2009.5199335","url":"https://dblp.org/rec/conf/icc/ChowdhuryB09"}, "url":"URL#5146449" }, { "@score":"1", "@id":"5146450", "info":{"authors":{"author":[{"@pid":"60/3808","text":"Søren Skovgaard Christensen"},{"@pid":"69/780","text":"Rajiv Agarwal"},{"@pid":"08/3273","text":"Elisabeth de Carvalho"},{"@pid":"40/1964","text":"John M. Cioffi"}]},"title":"Weighted Sum-Rate Maximization Using Weighted MMSE for MIMO-BC Beamforming Design.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChristensenACC09","doi":"10.1109/ICC.2009.5199574","ee":"https://doi.org/10.1109/ICC.2009.5199574","url":"https://dblp.org/rec/conf/icc/ChristensenACC09"}, "url":"URL#5146450" }, { "@score":"1", "@id":"5146451", "info":{"authors":{"author":[{"@pid":"43/8972","text":"Kostas Christodoulopoulos"},{"@pid":"17/4482","text":"Konstantinos Manousakis"},{"@pid":"65/3440","text":"Emmanouel A. Varvarigos"},{"@pid":"24/7881","text":"Marianna Angelou"},{"@pid":"56/1654","text":"Ioannis Tomkos"}]},"title":"A Multicost Approach to Online Impairment-Aware RWA.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChristodoulopoulosMVAT09","doi":"10.1109/ICC.2009.5198633","ee":"https://doi.org/10.1109/ICC.2009.5198633","url":"https://dblp.org/rec/conf/icc/ChristodoulopoulosMVAT09"}, "url":"URL#5146451" }, { "@score":"1", "@id":"5146452", "info":{"authors":{"author":[{"@pid":"80/6365","text":"Josephine P. K. Chu"},{"@pid":"71/6889","text":"Andrew W. Eckford"},{"@pid":"22/3660","text":"Raviraj Adve"}]},"title":"Optimization for Fractional Cooperation in Multiple-Source Multiple-Relay Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ChuEA09","doi":"10.1109/ICC.2009.5199292","ee":"https://doi.org/10.1109/ICC.2009.5199292","url":"https://dblp.org/rec/conf/icc/ChuEA09"}, "url":"URL#5146452" }, { "@score":"1", "@id":"5146453", "info":{"authors":{"author":[{"@pid":"98/3328","text":"Holger Claussen 0001"},{"@pid":"10/1687","text":"Florian Pivit"}]},"title":"Femtocell Coverage Optimization Using Switched Multi-Element Antennas.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ClaussenP09","doi":"10.1109/ICC.2009.5199033","ee":"https://doi.org/10.1109/ICC.2009.5199033","url":"https://dblp.org/rec/conf/icc/ClaussenP09"}, "url":"URL#5146453" }, { "@score":"1", "@id":"5146454", "info":{"authors":{"author":[{"@pid":"10/1010","text":"Ashfiqua T. Connie"},{"@pid":"p/YaserPourmohammadi","text":"Yaser P. Fallah"},{"@pid":"55/3871","text":"Panos Nasiopoulos"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Efficient Utilization of Error Protection Techniques for Transmission of Data-Partitioned H.264 Video in a Capacity Constrained Network.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ConnieFNL09","doi":"10.1109/ICC.2009.5198980","ee":"https://doi.org/10.1109/ICC.2009.5198980","url":"https://dblp.org/rec/conf/icc/ConnieFNL09"}, "url":"URL#5146454" }, { "@score":"1", "@id":"5146455", "info":{"authors":{"author":[{"@pid":"46/2825","text":"Kevin Corcoran"},{"@pid":"67/7881","text":"Seth R. Flaxman"},{"@pid":"85/7882","text":"Mark Neyer"},{"@pid":"00/7882","text":"Peter Scherpelz"},{"@pid":"34/7218","text":"Craig Weidert"},{"@pid":"84/2066","text":"Ran Libeskind-Hadas"}]},"title":"Approximation Algorithms for Traffic Grooming in WDM Rings.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CorcoranFNSWL09","doi":"10.1109/ICC.2009.5198761","ee":"https://doi.org/10.1109/ICC.2009.5198761","url":"https://dblp.org/rec/conf/icc/CorcoranFNSWL09"}, "url":"URL#5146455" }, { "@score":"1", "@id":"5146456", "info":{"authors":{"author":[{"@pid":"28/7170","text":"Igino Corona"},{"@pid":"20/3923","text":"Davide Ariu"},{"@pid":"52/3657","text":"Giorgio Giacinto"}]},"title":"HMM-Web: A Framework for the Detection of Attacks Against Web Applications.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CoronaAG09","doi":"10.1109/ICC.2009.5199054","ee":"https://doi.org/10.1109/ICC.2009.5199054","url":"https://dblp.org/rec/conf/icc/CoronaAG09"}, "url":"URL#5146456" }, { "@score":"1", "@id":"5146457", "info":{"authors":{"author":[{"@pid":"88/6219","text":"Daniel Benevides da Costa"},{"@pid":"77/1439","text":"Sonia Aïssa"}]},"title":"Beamforming in Dual-Hop Fixed Gain Relaying Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CostaA09","doi":"10.1109/ICC.2009.5198781","ee":"https://doi.org/10.1109/ICC.2009.5198781","url":"https://dblp.org/rec/conf/icc/CostaA09"}, "url":"URL#5146457" }, { "@score":"1", "@id":"5146458", "info":{"authors":{"author":[{"@pid":"88/6219","text":"Daniel Benevides da Costa"},{"@pid":"77/1439","text":"Sonia Aïssa"}]},"title":"Performance of Cooperative Diversity Networks: Analysis of Amplify-and-Forward Relaying under Equal-Gain and Maximal-Ratio Combining.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CostaA09a","doi":"10.1109/ICC.2009.5199330","ee":"https://doi.org/10.1109/ICC.2009.5199330","url":"https://dblp.org/rec/conf/icc/CostaA09a"}, "url":"URL#5146458" }, { "@score":"1", "@id":"5146459", "info":{"authors":{"author":[{"@pid":"84/7883","text":"Diego Costantini"},{"@pid":"b/PaoloBellavista","text":"Paolo Bellavista"},{"@pid":"05/4039","text":"Saverio Niccolini"}]},"title":"PreQuEst: A Scalable and Proactive Quality Enrichment for Presence Services.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CostantiniBN09","doi":"10.1109/ICC.2009.5199360","ee":"https://doi.org/10.1109/ICC.2009.5199360","url":"https://dblp.org/rec/conf/icc/CostantiniBN09"}, "url":"URL#5146459" }, { "@score":"1", "@id":"5146460", "info":{"authors":{"author":{"@pid":"23/7881","text":"Alan J. Coulson"}},"title":"Spectrum Sensing Using Hidden Markov Modeling.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Coulson09","doi":"10.1109/ICC.2009.5199481","ee":"https://doi.org/10.1109/ICC.2009.5199481","url":"https://dblp.org/rec/conf/icc/Coulson09"}, "url":"URL#5146460" }, { "@score":"1", "@id":"5146461", "info":{"authors":{"author":[{"@pid":"23/7883","text":"Thomas A. Courtade"},{"@pid":"51/5171","text":"Richard D. Wesel"}]},"title":"A Cross-Layer Perspective on Rateless Coding for Wireless Channels.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CourtadeW09","doi":"10.1109/ICC.2009.5198588","ee":"https://doi.org/10.1109/ICC.2009.5198588","url":"https://dblp.org/rec/conf/icc/CourtadeW09"}, "url":"URL#5146461" }, { "@score":"1", "@id":"5146462", "info":{"authors":{"author":[{"@pid":"35/7883","text":"Emanuele Coviello"},{"@pid":"50/819","text":"Abhijeet Bhorkar"},{"@pid":"75/6762","text":"Francesco Rossetto"},{"@pid":"32/1480","text":"Bhaskar D. Rao"},{"@pid":"14/2991","text":"Michele Zorzi"}]},"title":"A Robust Approach to Carrier Sense for MIMO Ad Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CovielloBRRZ09","doi":"10.1109/ICC.2009.5198664","ee":"https://doi.org/10.1109/ICC.2009.5198664","url":"https://dblp.org/rec/conf/icc/CovielloBRRZ09"}, "url":"URL#5146462" }, { "@score":"1", "@id":"5146463", "info":{"authors":{"author":[{"@pid":"31/234","text":"Sérgio Crisóstomo"},{"@pid":"42/2695","text":"Udo Schilcher"},{"@pid":"65/5083","text":"Christian Bettstetter"},{"@pid":"91/1276","text":"João Barros"}]},"title":"Analysis of Probabilistic Flooding: How Do We Choose the Right Coin?","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CrisostomoSBB09","doi":"10.1109/ICC.2009.5198745","ee":"https://doi.org/10.1109/ICC.2009.5198745","url":"https://dblp.org/rec/conf/icc/CrisostomoSBB09"}, "url":"URL#5146463" }, { "@score":"1", "@id":"5146464", "info":{"authors":{"author":[{"@pid":"39/3859","text":"Shengshan Cui"},{"@pid":"01/1938","text":"Alexander M. Haimovich"},{"@pid":"18/4818","text":"Oren Somekh"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"},{"@pid":"s/ShlomoShamai","text":"Shlomo Shamai"}]},"title":"Throughput Scaling of Wireless Networks With Random Connections.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CuiHSPS09","doi":"10.1109/ICC.2009.5199528","ee":"https://doi.org/10.1109/ICC.2009.5199528","url":"https://dblp.org/rec/conf/icc/CuiHSPS09"}, "url":"URL#5146464" }, { "@score":"1", "@id":"5146465", "info":{"authors":{"author":[{"@pid":"58/2994","text":"Tao Cui"},{"@pid":"97/6483","text":"Feng Lu"},{"@pid":"58/7883","text":"Anil Goteti"},{"@pid":"45/3320","text":"Vignesh Sethuraman"},{"@pid":"92/7882","text":"S. P. Rao"},{"@pid":"53/1080","text":"P. Subrahmanya"}]},"title":"Throughput Optimization in High Speed Downlink Packet Access (HSDPA).","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CuiLGSRS09","doi":"10.1109/ICC.2009.5199527","ee":"https://doi.org/10.1109/ICC.2009.5199527","url":"https://dblp.org/rec/conf/icc/CuiLGSRS09"}, "url":"URL#5146465" }, { "@score":"1", "@id":"5146466", "info":{"authors":{"author":[{"@pid":"73/2753-1","text":"Yang Cui 0001"},{"@pid":"54/5088","text":"Mingmei Li"},{"@pid":"66/7882","text":"Kazuya Yokoyama"},{"@pid":"14/1398","text":"Hideki Imai"}]},"title":"Efficient and Adaptively Secure Append-Only Signature.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CuiLYI09","doi":"10.1109/ICC.2009.5198969","ee":"https://doi.org/10.1109/ICC.2009.5198969","url":"https://dblp.org/rec/conf/icc/CuiLYI09"}, "url":"URL#5146466" }, { "@score":"1", "@id":"5146467", "info":{"authors":{"author":[{"@pid":"59/5079","text":"Lukasz Czekierda"},{"@pid":"50/7884","text":"Miroslaw Jedynak"},{"@pid":"33/7881","text":"Tomasz Masternak"}]},"title":"IGCP: A Platform for Interactive Communication in Groupware Applications.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/CzekierdaJM09","doi":"10.1109/ICC.2009.5199064","ee":"https://doi.org/10.1109/ICC.2009.5199064","url":"https://dblp.org/rec/conf/icc/CzekierdaJM09"}, "url":"URL#5146467" }, { "@score":"1", "@id":"5146468", "info":{"authors":{"author":{"@pid":"d/OnkarDabeer","text":"Onkar Dabeer"}},"title":"Optimal Transmitters for Hypothesis Testing over a Rayleigh Fading MAC.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Dabeer09","doi":"10.1109/ICC.2009.5199288","ee":"https://doi.org/10.1109/ICC.2009.5199288","url":"https://dblp.org/rec/conf/icc/Dabeer09"}, "url":"URL#5146468" }, { "@score":"1", "@id":"5146469", "info":{"authors":{"author":[{"@pid":"47/7881","text":"Abes Dabir"},{"@pid":"11/2732","text":"Ashraf Matrawy"}]},"title":"Design and Analysis of a Hierarchical IP Traceback System.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DabirM09","doi":"10.1109/ICC.2009.5198896","ee":"https://doi.org/10.1109/ICC.2009.5198896","url":"https://dblp.org/rec/conf/icc/DabirM09"}, "url":"URL#5146469" }, { "@score":"1", "@id":"5146470", "info":{"authors":{"author":[{"@pid":"83/566","text":"Rui Dai"},{"@pid":"a/IAAkyildiz","text":"Ian F. Akyildiz"}]},"title":"Joint Effect of Multiple Correlated Cameras in Wireless Multimedia Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DaiA09","doi":"10.1109/ICC.2009.5199112","ee":"https://doi.org/10.1109/ICC.2009.5199112","url":"https://dblp.org/rec/conf/icc/DaiA09"}, "url":"URL#5146470" }, { "@score":"1", "@id":"5146471", "info":{"authors":{"author":[{"@pid":"53/3197","text":"Xiaoming Dai"},{"@pid":"46/2181","text":"Yang Yu"},{"@pid":"41/7884","text":"Changguo Sun"},{"@pid":"38/7881","text":"Shaohui Sun"},{"@pid":"59/605","text":"Yingming Wang"}]},"title":"Shedding New Light on Sequence Design Criteria for Multipath Channels.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DaiYSSW09","doi":"10.1109/ICC.2009.5199456","ee":"https://doi.org/10.1109/ICC.2009.5199456","url":"https://dblp.org/rec/conf/icc/DaiYSSW09"}, "url":"URL#5146471" }, { "@score":"1", "@id":"5146472", "info":{"authors":{"author":[{"@pid":"70/6553","text":"Ananya Das"},{"@pid":"77/5716","text":"Charles U. Martel"},{"@pid":"86/3964","text":"Biswanath Mukherjee"}]},"title":"A Partial-Protection Approach Using Multipath Provisioning.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DasMM09","doi":"10.1109/ICC.2009.5198655","ee":"https://doi.org/10.1109/ICC.2009.5198655","url":"https://dblp.org/rec/conf/icc/DasMM09"}, "url":"URL#5146472" }, { "@score":"1", "@id":"5146473", "info":{"authors":{"author":[{"@pid":"72/147","text":"Franco Davoli"},{"@pid":"13/4788","text":"Mario Marchese"},{"@pid":"28/4726","text":"Maurizio Mongelli"}]},"title":"A Decision Theoretic Approach to Gaussian Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DavoliMM09","doi":"10.1109/ICC.2009.5198590","ee":"https://doi.org/10.1109/ICC.2009.5198590","url":"https://dblp.org/rec/conf/icc/DavoliMM09"}, "url":"URL#5146473" }, { "@score":"1", "@id":"5146474", "info":{"authors":{"author":[{"@pid":"46/4457","text":"Dan J. Dechene"},{"@pid":"26/704","text":"Abdallah Shami"}]},"title":"Experimental Triple-Play Service Delivery Using Commodity Wireless LAN Hardware.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DecheneS09","doi":"10.1109/ICC.2009.5199015","ee":"https://doi.org/10.1109/ICC.2009.5199015","url":"https://dblp.org/rec/conf/icc/DecheneS09"}, "url":"URL#5146474" }, { "@score":"1", "@id":"5146475", "info":{"authors":{"author":[{"@pid":"03/7883","text":"Huan Deng"},{"@pid":"43/1108","text":"Margreta Kuijper"},{"@pid":"84/3479","text":"Jamie S. Evans"}]},"title":"Burst Erasure Correction Capabilities of (n, n-1) Convolutional Codes.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DengKE09","doi":"10.1109/ICC.2009.5198799","ee":"https://doi.org/10.1109/ICC.2009.5198799","url":"https://dblp.org/rec/conf/icc/DengKE09"}, "url":"URL#5146475" }, { "@score":"1", "@id":"5146476", "info":{"authors":{"author":[{"@pid":"99/3677","text":"Claude Desset"},{"@pid":"88/4533","text":"Noman Ahmed"},{"@pid":"93/2764","text":"Antoine Dejonghe"}]},"title":"Energy Savings for Wireless Terminals through Smart Vertical Handover.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DessetAD09","doi":"10.1109/ICC.2009.5198995","ee":"https://doi.org/10.1109/ICC.2009.5198995","url":"https://dblp.org/rec/conf/icc/DessetAD09"}, "url":"URL#5146476" }, { "@score":"1", "@id":"5146477", "info":{"authors":{"author":[{"@pid":"77/6564","text":"K. D. Prathapasinghe Dharmawansa"},{"@pid":"51/5954","text":"Matthew R. McKay"},{"@pid":"67/6954","text":"Ranjan K. Mallik"}]},"title":"Dual Hop MIMO Relaying with Orthogonal Space-Time Block Codes.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DharmawansaMM09","doi":"10.1109/ICC.2009.5198951","ee":"https://doi.org/10.1109/ICC.2009.5198951","url":"https://dblp.org/rec/conf/icc/DharmawansaMM09"}, "url":"URL#5146477" }, { "@score":"1", "@id":"5146478", "info":{"authors":{"author":[{"@pid":"52/6933","text":"Sanjay K. Dhurandher"},{"@pid":"36/1023","text":"Sudip Misra"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"},{"@pid":"31/7884","text":"Pushkar Gupta"},{"@pid":"46/7883","text":"Karan Verma"},{"@pid":"89/257","text":"Prayag Narula"}]},"title":"An Energy-Aware Routing Protocol for Ad-Hoc Networks Based on the Foraging Behavior in Ant Swarms.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DhurandherMOGVN09","doi":"10.1109/ICC.2009.5198728","ee":"https://doi.org/10.1109/ICC.2009.5198728","url":"https://dblp.org/rec/conf/icc/DhurandherMOGVN09"}, "url":"URL#5146478" }, { "@score":"1", "@id":"5146479", "info":{"authors":{"author":[{"@pid":"26/1839","text":"Lianghui Ding"},{"@pid":"85/4712","text":"Meixia Tao"},{"@pid":"29/3081","text":"Fan Yang"},{"@pid":"46/3359-1","text":"Wenjun Zhang 0001"}]},"title":"Joint Scheduling and Relay Selection in One- and Two-Way Relay Networks with Buffering.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DingTYZ09","doi":"10.1109/ICC.2009.5199121","ee":"https://doi.org/10.1109/ICC.2009.5199121","url":"https://dblp.org/rec/conf/icc/DingTYZ09"}, "url":"URL#5146479" }, { "@score":"1", "@id":"5146480", "info":{"authors":{"author":[{"@pid":"32/4467","text":"Soufiene Djahel"},{"@pid":"05/720","text":"Farid Naït-Abdesselam"}]},"title":"A Fuzzy Logic Based Scheme to Detect Adaptive Cheaters in Wireless LAN.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DjahelN09","doi":"10.1109/ICC.2009.5198606","ee":"https://doi.org/10.1109/ICC.2009.5198606","url":"https://dblp.org/rec/conf/icc/DjahelN09"}, "url":"URL#5146480" }, { "@score":"1", "@id":"5146481", "info":{"authors":{"author":[{"@pid":"00/1283","text":"Tai T. Do"},{"@pid":"233/0688","text":"Kien A. Hua"},{"@pid":"142/3301","text":"Alexander J. Aved"},{"@pid":"10/4260","text":"Fuyu Liu"},{"@pid":"74/2686","text":"Ning Jiang"}]},"title":"Scalable Video-On-Demand Streaming in Mobile Wireless Hybrid Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DoHALJ09","doi":"10.1109/ICC.2009.5199435","ee":"https://doi.org/10.1109/ICC.2009.5199435","url":"https://dblp.org/rec/conf/icc/DoHALJ09"}, "url":"URL#5146481" }, { "@score":"1", "@id":"5146482", "info":{"authors":{"author":[{"@pid":"07/6208","text":"Jerzy Domzal"},{"@pid":"28/6064","text":"Andrzej Jajszczyk"}]},"title":"Approximate Flow-Aware Networking.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DomzalJ09","doi":"10.1109/ICC.2009.5198757","ee":"https://doi.org/10.1109/ICC.2009.5198757","url":"https://dblp.org/rec/conf/icc/DomzalJ09"}, "url":"URL#5146482" }, { "@score":"1", "@id":"5146483", "info":{"authors":{"author":[{"@pid":"91/5844","text":"Lijun Dong"},{"@pid":"78/6365-5","text":"Hongbo Liu 0005"},{"@pid":"44/2799","text":"Yanyong Zhang"},{"@pid":"45/217","text":"Sanjoy Paul"},{"@pid":"62/6788","text":"Dipankar Raychaudhuri"}]},"title":"On the Cache-and-Forward Network Architecture.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DongLZPR09","doi":"10.1109/ICC.2009.5199249","ee":"https://doi.org/10.1109/ICC.2009.5199249","url":"https://dblp.org/rec/conf/icc/DongLZPR09"}, "url":"URL#5146483" }, { "@score":"1", "@id":"5146484", "info":{"authors":{"author":[{"@pid":"72/6853","text":"André C. Drummond"},{"@pid":"f/NelsonLSdaFonseca","text":"Nelson L. S. da Fonseca"}]},"title":"On-Line Dynamic Traffic Grooming Algorithms for WDM Mesh Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DrummondF09","doi":"10.1109/ICC.2009.5199273","ee":"https://doi.org/10.1109/ICC.2009.5199273","url":"https://dblp.org/rec/conf/icc/DrummondF09"}, "url":"URL#5146484" }, { "@score":"1", "@id":"5146485", "info":{"authors":{"author":[{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"l/XueLiu","text":"Xue Liu 0001"},{"@pid":"181/1848-1","text":"Yang Xiao 0001"}]},"title":"Density-Varying High-End Sensor Placement in Heterogeneous Wireless Sensor Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DuLX09","doi":"10.1109/ICC.2009.5198894","ee":"https://doi.org/10.1109/ICC.2009.5198894","url":"https://dblp.org/rec/conf/icc/DuLX09"}, "url":"URL#5146485" }, { "@score":"1", "@id":"5146486", "info":{"authors":{"author":[{"@pid":"77/206","text":"Jinfeng Du"},{"@pid":"13/3221","text":"Svante Signell"}]},"title":"Novel Preamble-Based Channel Estimation for OFDM/OQAM Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DuS09","doi":"10.1109/ICC.2009.5199226","ee":"https://doi.org/10.1109/ICC.2009.5199226","url":"https://dblp.org/rec/conf/icc/DuS09"}, "url":"URL#5146486" }, { "@score":"1", "@id":"5146487", "info":{"authors":{"author":[{"@pid":"05/1627","text":"Qinghe Du"},{"@pid":"87/1222-5","text":"Xi Zhang 0005"}]},"title":"Effective Capacity of Superposition Coding Based Mobile Multicast in Wireless Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DuZ09","doi":"10.1109/ICC.2009.5198964","ee":"https://doi.org/10.1109/ICC.2009.5198964","url":"https://dblp.org/rec/conf/icc/DuZ09"}, "url":"URL#5146487" }, { "@score":"1", "@id":"5146488", "info":{"authors":{"author":[{"@pid":"42/7881","text":"Ahmet Onur Durahim"},{"@pid":"82/2842","text":"Albert Levi"}]},"title":"Dynamic Resiliency Analysis of Key Predistribution in Wireless Sensor Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DurahimL09","doi":"10.1109/ICC.2009.5198959","ee":"https://doi.org/10.1109/ICC.2009.5198959","url":"https://dblp.org/rec/conf/icc/DurahimL09"}, "url":"URL#5146488" }, { "@score":"1", "@id":"5146489", "info":{"authors":{"author":[{"@pid":"45/5278","text":"Maurizio Dusi"},{"@pid":"86/1756","text":"Alice Este"},{"@pid":"59/4302","text":"Francesco Gringoli"},{"@pid":"97/491","text":"Luca Salgarelli"}]},"title":"Using GMM and SVM-Based Techniques for the Classification of SSH-Encrypted Traffic.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/DusiEGS09","doi":"10.1109/ICC.2009.5199557","ee":"https://doi.org/10.1109/ICC.2009.5199557","url":"https://dblp.org/rec/conf/icc/DusiEGS09"}, "url":"URL#5146489" }, { "@score":"1", "@id":"5146490", "info":{"authors":{"author":[{"@pid":"21/1912","text":"Alexander Eichhorn"},{"@pid":"57/1062","text":"Pengpeng Ni"}]},"title":"Pick Your Layers Wisely - A Quality Assessment of H.264 Scalable Video Coding for Mobile Devices.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/EichhornN09","doi":"10.1109/ICC.2009.5305948","ee":"https://doi.org/10.1109/ICC.2009.5305948","url":"https://dblp.org/rec/conf/icc/EichhornN09"}, "url":"URL#5146490" }, { "@score":"1", "@id":"5146491", "info":{"authors":{"author":[{"@pid":"58/7882","text":"Emna Eitel"},{"@pid":"25/7883","text":"Rana H. Ahmed Salem"},{"@pid":"80/2998","text":"Joachim Speidel"}]},"title":"Improved Decision-Directed Recursive Least Squares MIMO Channel Tracking.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/EitelSS09","doi":"10.1109/ICC.2009.5199071","ee":"https://doi.org/10.1109/ICC.2009.5199071","url":"https://dblp.org/rec/conf/icc/EitelSS09"}, "url":"URL#5146491" }, { "@score":"1", "@id":"5146492", "info":{"authors":{"author":[{"@pid":"70/5178","text":"Ersen Ekrem"},{"@pid":"u/SennurUlukus","text":"Sennur Ulukus"}]},"title":"Ergodic Secrecy Capacity Region of the Fading Broadcast Channel.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/EkremU09","doi":"10.1109/ICC.2009.5199000","ee":"https://doi.org/10.1109/ICC.2009.5199000","url":"https://dblp.org/rec/conf/icc/EkremU09"}, "url":"URL#5146492" }, { "@score":"1", "@id":"5146493", "info":{"authors":{"author":[{"@pid":"27/5591","text":"Mohamed Abo El-Fotouh"},{"@pid":"27/5714","text":"Klaus Diepold"}]},"title":"Cryptanalysis of Substitution Cipher Chaining Mode (SCC).","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/El-FotouhD09","doi":"10.1109/ICC.2009.5198877","ee":"https://doi.org/10.1109/ICC.2009.5198877","url":"https://dblp.org/rec/conf/icc/El-FotouhD09"}, "url":"URL#5146493" }, { "@score":"1", "@id":"5146494", "info":{"authors":{"author":[{"@pid":"74/2700","text":"Mohammed El-Hajjar"},{"@pid":"25/4008","text":"Osamah Alamri"},{"@pid":"29/4265","text":"Robert G. Maunder"},{"@pid":"92/5955","text":"Lajos Hanzo"}]},"title":"Iteratively Detected Generalised MC DS-CDMA Using Layered Steeered Space-Time Spreading.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/El-HajjarAMH09","doi":"10.1109/ICC.2009.5199108","ee":"https://doi.org/10.1109/ICC.2009.5199108","url":"https://dblp.org/rec/conf/icc/El-HajjarAMH09"}, "url":"URL#5146494" }, { "@score":"1", "@id":"5146495", "info":{"authors":{"author":[{"@pid":"12/2684","text":"Salah-Eddine Elayoubi"},{"@pid":"21/7883","text":"Max Francisco"}]},"title":"Capacity of Hierarchical WiFi/WiMAX Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ElayoubiF09","doi":"10.1109/ICC.2009.5198805","ee":"https://doi.org/10.1109/ICC.2009.5198805","url":"https://dblp.org/rec/conf/icc/ElayoubiF09"}, "url":"URL#5146495" }, { "@score":"1", "@id":"5146496", "info":{"authors":{"author":[{"@pid":"98/6377","text":"Maged Elkashlan"},{"@pid":"29/6497-1","text":"Zhuo Chen 0001"},{"@pid":"07/3441","text":"Iain B. Collings"},{"@pid":"05/1670","text":"Witold A. Krzymieri"}]},"title":"General Order Selection Allocation for Decentralized Multiple Access Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ElkashlanCCK09","doi":"10.1109/ICC.2009.5199044","ee":"https://doi.org/10.1109/ICC.2009.5199044","url":"https://dblp.org/rec/conf/icc/ElkashlanCCK09"}, "url":"URL#5146496" }, { "@score":"1", "@id":"5146497", "info":{"authors":{"author":[{"@pid":"60/7881","text":"Amin Emad"},{"@pid":"62/6601","text":"Norman C. Beaulieu"}]},"title":"Mean Time to Loss of Lock and Average Switching Rate of an Automatic Frequency Control Loop with an Interferer and Noise in a Fading Channel.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/EmadB09","doi":"10.1109/ICC.2009.5199173","ee":"https://doi.org/10.1109/ICC.2009.5199173","url":"https://dblp.org/rec/conf/icc/EmadB09"}, "url":"URL#5146497" }, { "@score":"1", "@id":"5146498", "info":{"authors":{"author":[{"@pid":"10/5893","text":"Celal Esli"},{"@pid":"98/3654-1","text":"Jörg Wagner 0001"},{"@pid":"82/4893","text":"Armin Wittneben"}]},"title":"Distributed Gradient Based Gain Allocation for Coherent Multiuser AF Relaying Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/EsliWW09","doi":"10.1109/ICC.2009.5198926","ee":"https://doi.org/10.1109/ICC.2009.5198926","url":"https://dblp.org/rec/conf/icc/EsliWW09"}, "url":"URL#5146498" }, { "@score":"1", "@id":"5146499", "info":{"authors":{"author":{"@pid":"68/261","text":"Benjamin Fabian"}},"title":"Implementing Secure P2P-ONS.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Fabian09","doi":"10.1109/ICC.2009.5199070","ee":"https://doi.org/10.1109/ICC.2009.5199070","url":"https://dblp.org/rec/conf/icc/Fabian09"}, "url":"URL#5146499" }, { "@score":"1", "@id":"5146500", "info":{"authors":{"author":[{"@pid":"74/1287","text":"Joachim Fabini"},{"@pid":"09/3250","text":"Lukas Wallentin"},{"@pid":"41/2683","text":"Peter Reichl"}]},"title":"The Importance of Being Really Random: Methodological Aspects of IP-Layer 2G and 3G Network Delay Assessment.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FabiniWR09","doi":"10.1109/ICC.2009.5199514","ee":"https://doi.org/10.1109/ICC.2009.5199514","url":"https://dblp.org/rec/conf/icc/FabiniWR09"}, "url":"URL#5146500" }, { "@score":"1", "@id":"5146501", "info":{"authors":{"author":[{"@pid":"07/7884","text":"Christian Facchini"},{"@pid":"39/4893","text":"Fabrizio Granelli"}]},"title":"Game Theory As a Tool for Modeling Cross-Layer Interactions.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FacchiniG09","doi":"10.1109/ICC.2009.5199043","ee":"https://doi.org/10.1109/ICC.2009.5199043","url":"https://dblp.org/rec/conf/icc/FacchiniG09"}, "url":"URL#5146501" }, { "@score":"1", "@id":"5146502", "info":{"authors":{"author":[{"@pid":"20/3825","text":"Kai Fan"},{"@pid":"03/7881","text":"Xi Wei"},{"@pid":"31/686","text":"Dongyang Long"}]},"title":"A Load-Balanced Route Selection for Network Coding in Wireless Mesh Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FanWL09","doi":"10.1109/ICC.2009.5198624","ee":"https://doi.org/10.1109/ICC.2009.5198624","url":"https://dblp.org/rec/conf/icc/FanWL09"}, "url":"URL#5146502" }, { "@score":"1", "@id":"5146503", "info":{"authors":{"author":[{"@pid":"60/105","text":"Bin Fan"},{"@pid":"28/4847","text":"Wenbo Wang 0007"},{"@pid":"41/7883","text":"Yicheng Lin"},{"@pid":"74/2101","text":"Lin Huang"},{"@pid":"77/6893","text":"Kan Zheng"}]},"title":"Subcarrier Allocation for OFDMA Relay Networks with Proportional Fair Constraint.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FanWLHZ09","doi":"10.1109/ICC.2009.5199495","ee":"https://doi.org/10.1109/ICC.2009.5199495","url":"https://dblp.org/rec/conf/icc/FanWLHZ09"}, "url":"URL#5146503" }, { "@score":"1", "@id":"5146504", "info":{"authors":{"author":[{"@pid":"51/3942","text":"Romano Fantacci"},{"@pid":"58/5643","text":"Leonardo Maccari"},{"@pid":"71/2349","text":"Matteo Rosi"},{"@pid":"68/5289","text":"Luigi Chisci"},{"@pid":"61/5674","text":"Luca Maria Aiello"},{"@pid":"51/3062","text":"Marco Milanesio"}]},"title":"Avoiding Eclipse Attacks on Kad/Kademlia: An Identity Based Approach.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FantacciMRCAM09","doi":"10.1109/ICC.2009.5198772","ee":"https://doi.org/10.1109/ICC.2009.5198772","url":"https://dblp.org/rec/conf/icc/FantacciMRCAM09"}, "url":"URL#5146504" }, { "@score":"1", "@id":"5146505", "info":{"authors":{"author":[{"@pid":"10/7401","text":"Ahmed A. Farid"},{"@pid":"17/1351","text":"Steve Hranilovic"}]},"title":"Capacity of Optical Intensity Channels with Peak and Average Power Constraints.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FaridH09","doi":"10.1109/ICC.2009.5198806","ee":"https://doi.org/10.1109/ICC.2009.5198806","url":"https://dblp.org/rec/conf/icc/FaridH09"}, "url":"URL#5146505" }, { "@score":"1", "@id":"5146506", "info":{"authors":{"author":[{"@pid":"56/1503","text":"Hossam Fattah"},{"@pid":"31/3227","text":"Hussein M. Alnuweiri"}]},"title":"Performance Evaluation of Contention-Based Access in IEEE 802.16 Networks with Subchannelization.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FattahA09","doi":"10.1109/ICC.2009.5199320","ee":"https://doi.org/10.1109/ICC.2009.5199320","url":"https://dblp.org/rec/conf/icc/FattahA09"}, "url":"URL#5146506" }, { "@score":"1", "@id":"5146507", "info":{"authors":{"author":[{"@pid":"44/1060","text":"Eriza Hafid Fazli"},{"@pid":"07/7883","text":"Angels Via Estrem"},{"@pid":"55/7882","text":"Sébastien Duflot"},{"@pid":"37/5961","text":"Markus Werner"}]},"title":"Demonstration of IPv6 Network Mobility in Aeronautical Communications Network.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FazliEDW09","doi":"10.1109/ICC.2009.5198892","ee":"https://doi.org/10.1109/ICC.2009.5198892","url":"https://dblp.org/rec/conf/icc/FazliEDW09"}, "url":"URL#5146507" }, { "@score":"1", "@id":"5146508", "info":{"authors":{"author":[{"@pid":"31/5872","text":"Mauro Femminella"},{"@pid":"69/7883","text":"Roberto Francescangeli"},{"@pid":"17/7881","text":"Francesco Giacinti"},{"@pid":"96/7881","text":"Emanuele Maccherani"},{"@pid":"01/7883","text":"Alessandro Parisi"},{"@pid":"31/4060","text":"Gianluca Reali"}]},"title":"Design, Implementation, and Performance Evaluation of an Advanced SIP-Based Call Control for VoIP Services.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FemminellaFGMPR09","doi":"10.1109/ICC.2009.5198905","ee":"https://doi.org/10.1109/ICC.2009.5198905","url":"https://dblp.org/rec/conf/icc/FemminellaFGMPR09"}, "url":"URL#5146508" }, { "@score":"1", "@id":"5146509", "info":{"authors":{"author":[{"@pid":"91/6134","text":"Taiming Feng"},{"@pid":"11/3879","text":"Lu Ruan 0001"}]},"title":"Design of Survivable Hybrid Wireless-Optical Broadband-Access Network.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FengR09","doi":"10.1109/ICC.2009.5198903","ee":"https://doi.org/10.1109/ICC.2009.5198903","url":"https://dblp.org/rec/conf/icc/FengR09"}, "url":"URL#5146509" }, { "@score":"1", "@id":"5146510", "info":{"authors":{"author":[{"@pid":"13/11244","text":"Zhen-Hua Feng"},{"@pid":"10/3200","text":"Yaling Yang"}]},"title":"Two Phase Spectrum Sharing for Frequency-Agile Radio Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FengY09","doi":"10.1109/ICC.2009.5199547","ee":"https://doi.org/10.1109/ICC.2009.5199547","url":"https://dblp.org/rec/conf/icc/FengY09"}, "url":"URL#5146510" }, { "@score":"1", "@id":"5146511", "info":{"authors":{"author":[{"@pid":"12/5389","text":"Carlos Estêvão R. Fernandes"},{"@pid":"10/446","text":"Gérard Favier"},{"@pid":"12/2493","text":"João Cesar M. Mota"}]},"title":"Blind Multipath MIMO Channel Parameter Estimation Using the Parafac Decomposition.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FernandesFM09","doi":"10.1109/ICC.2009.5198793","ee":"https://doi.org/10.1109/ICC.2009.5198793","url":"https://dblp.org/rec/conf/icc/FernandesFM09"}, "url":"URL#5146511" }, { "@score":"1", "@id":"5146512", "info":{"authors":{"author":[{"@pid":"72/5543","text":"Dario Fertonani"},{"@pid":"d/TolgaMDuman","text":"Tolga M. Duman"}]},"title":"Upper Bounding the Deletion Channel Capacity by Auxiliary Memoryless Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FertonaniD09","doi":"10.1109/ICC.2009.5199553","ee":"https://doi.org/10.1109/ICC.2009.5199553","url":"https://dblp.org/rec/conf/icc/FertonaniD09"}, "url":"URL#5146512" }, { "@score":"1", "@id":"5146513", "info":{"authors":{"author":[{"@pid":"76/3949","text":"Abdelhanin Filali"},{"@pid":"73/2285","text":"Abdelhakim Senhaji Hafid"},{"@pid":"08/5862","text":"Michel Gendreau"}]},"title":"Bandwidth and Computing Resources Provisioning for Grid Applications and Services.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FilaliHG09","doi":"10.1109/ICC.2009.5198775","ee":"https://doi.org/10.1109/ICC.2009.5198775","url":"https://dblp.org/rec/conf/icc/FilaliHG09"}, "url":"URL#5146513" }, { "@score":"1", "@id":"5146514", "info":{"authors":{"author":[{"@pid":"67/7025","text":"Abdulla Firag"},{"@pid":"57/5882-1","text":"Peter J. Smith 0001"},{"@pid":"51/5954","text":"Matthew R. McKay"}]},"title":"Capacity Analysis for MIMO Two-Hop Amplify-and-Forward Relaying Systems with the Source to Destination Link.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FiragSM09","doi":"10.1109/ICC.2009.5198803","ee":"https://doi.org/10.1109/ICC.2009.5198803","url":"https://dblp.org/rec/conf/icc/FiragSM09"}, "url":"URL#5146514" }, { "@score":"1", "@id":"5146515", "info":{"authors":{"author":[{"@pid":"40/4085","text":"Robert F. H. Fischer"},{"@pid":"40/6525","text":"Christian Siegl"}]},"title":"Successive PAR Reduction in (MIMO) OFDM.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FischerS09","doi":"10.1109/ICC.2009.5199497","ee":"https://doi.org/10.1109/ICC.2009.5199497","url":"https://dblp.org/rec/conf/icc/FischerS09"}, "url":"URL#5146515" }, { "@score":"1", "@id":"5146516", "info":{"authors":{"author":[{"@pid":"61/6100","text":"Carlo Fischione"},{"@pid":"42/46","text":"Stefano Tennina"},{"@pid":"30/632","text":"Fortunato Santucci"},{"@pid":"69/7017","text":"Fabio Graziosi"}]},"title":"Reliability and Efficiency Analysis of Distributed Source Coding in Wireless Sensor Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FischioneTSG09","doi":"10.1109/ICC.2009.5199407","ee":"https://doi.org/10.1109/ICC.2009.5199407","url":"https://dblp.org/rec/conf/icc/FischioneTSG09"}, "url":"URL#5146516" }, { "@score":"1", "@id":"5146517", "info":{"authors":{"author":[{"@pid":"28/313","text":"Viktória Fodor"},{"@pid":"60/3802","text":"Ioannis Glaropoulos"},{"@pid":"80/1314","text":"Loreto Pescosolido"}]},"title":"Detecting Low-Power Primary Signals via Distributed Sensing to Support Opportunistic Spectrum Access.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FodorGP09","doi":"10.1109/ICC.2009.5198909","ee":"https://doi.org/10.1109/ICC.2009.5198909","url":"https://dblp.org/rec/conf/icc/FodorGP09"}, "url":"URL#5146517" }, { "@score":"1", "@id":"5146518", "info":{"authors":{"author":[{"@pid":"35/301","text":"Andreas Frotzscher"},{"@pid":"86/2936","text":"Marco Krondorf"},{"@pid":"f/GFettweis","text":"Gerhard P. Fettweis"}]},"title":"On the Performance of OFDM in Zero-IF Receivers Impaired by Tx Leakage.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FrotzscherKF09","doi":"10.1109/ICC.2009.5199264","ee":"https://doi.org/10.1109/ICC.2009.5199264","url":"https://dblp.org/rec/conf/icc/FrotzscherKF09"}, "url":"URL#5146518" }, { "@score":"1", "@id":"5146519", "info":{"authors":{"author":{"@pid":"17/1352-11","text":"Qiang Fu 0011"}},"title":"Improving Throughput in High Bandwidth-Delay Product Networks with Random Packet Losses.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Fu09","doi":"10.1109/ICC.2009.5199079","ee":"https://doi.org/10.1109/ICC.2009.5199079","url":"https://dblp.org/rec/conf/icc/Fu09"}, "url":"URL#5146519" }, { "@score":"1", "@id":"5146520", "info":{"authors":{"author":{"@pid":"17/1352-11","text":"Qiang Fu 0011"}},"title":"Delay-Based Congestion Avoidance for QoS Provisioning in Wired/Wireless Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Fu09a","doi":"10.1109/ICC.2009.5198890","ee":"https://doi.org/10.1109/ICC.2009.5198890","url":"https://dblp.org/rec/conf/icc/Fu09a"}, "url":"URL#5146520" }, { "@score":"1", "@id":"5146521", "info":{"authors":{"author":[{"@pid":"56/5699","text":"Tilde Fusco"},{"@pid":"78/2066","text":"Angelo Petrella"},{"@pid":"66/718","text":"Mario Tanda"}]},"title":"A Data-Aided Symbol Timing Estimation Algorithm for OFDM/OQAM Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/FuscoPT09","doi":"10.1109/ICC.2009.5198589","ee":"https://doi.org/10.1109/ICC.2009.5198589","url":"https://dblp.org/rec/conf/icc/FuscoPT09"}, "url":"URL#5146521" }, { "@score":"1", "@id":"5146522", "info":{"authors":{"author":[{"@pid":"64/6780","text":"Arush Gadkar"},{"@pid":"10/4014","text":"Suresh Subramaniam 0001"}]},"title":"Optimal FDL Design for Time-Wavelength Crossconnects and Optical Packet Switches.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GadkarS09","doi":"10.1109/ICC.2009.5199280","ee":"https://doi.org/10.1109/ICC.2009.5199280","url":"https://dblp.org/rec/conf/icc/GadkarS09"}, "url":"URL#5146522" }, { "@score":"1", "@id":"5146523", "info":{"authors":{"author":[{"@pid":"79/7882","text":"Antonio Galante"},{"@pid":"28/7882","text":"Ary Kokos"},{"@pid":"z/StefanoZanero","text":"Stefano Zanero"}]},"title":"BlueBat: Towards Practical Bluetooth Honeypots.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GalanteKZ09","doi":"10.1109/ICC.2009.5198796","ee":"https://doi.org/10.1109/ICC.2009.5198796","url":"https://dblp.org/rec/conf/icc/GalanteKZ09"}, "url":"URL#5146523" }, { "@score":"1", "@id":"5146524", "info":{"authors":{"author":[{"@pid":"63/2638","text":"José R. Gallardo"},{"@pid":"27/526","text":"Dimitrios Makrakis"},{"@pid":"217/2530","text":"Hussein T. Mouftah"}]},"title":"Performance Analysis of the EDCA Medium Access Mechanism over the Control Channel of an IEEE 802.11p WAVE Vehicular Network.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GallardoMM09","doi":"10.1109/ICC.2009.5199316","ee":"https://doi.org/10.1109/ICC.2009.5199316","url":"https://dblp.org/rec/conf/icc/GallardoMM09"}, "url":"URL#5146524" }, { "@score":"1", "@id":"5146525", "info":{"authors":{"author":[{"@pid":"24/1820","text":"Gang Hu"},{"@pid":"22/4693","text":"Lixia Liu"},{"@pid":"04/2024-1","text":"Qian Zhang 0001"},{"@pid":"43/3362-2","text":"Ming Xu 0002"}]},"title":"Approximated Matching-Based Spectrum Access Algorithm for Heterogenous Cognitive Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GangLZX09","doi":"10.1109/ICC.2009.5198758","ee":"https://doi.org/10.1109/ICC.2009.5198758","url":"https://dblp.org/rec/conf/icc/GangLZX09"}, "url":"URL#5146525" }, { "@score":"1", "@id":"5146526", "info":{"authors":{"author":[{"@pid":"46/46","text":"Su Gao"},{"@pid":"11/916","text":"Cong Ling 0001"}]},"title":"Multi-Dimensional Nested Lattice Quantization for Wyner-Ziv Coding.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GaoL09","doi":"10.1109/ICC.2009.5199198","ee":"https://doi.org/10.1109/ICC.2009.5199198","url":"https://dblp.org/rec/conf/icc/GaoL09"}, "url":"URL#5146526" }, { "@score":"1", "@id":"5146527", "info":{"authors":{"author":[{"@pid":"62/7882","text":"Mingsheng Gao"},{"@pid":"38/5335","text":"Wee-Seng Soh"},{"@pid":"85/4712","text":"Meixia Tao"}]},"title":"A Transmission Scheme for Continuous ARQ Protocols over Underwater Acoustic Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GaoST09","doi":"10.1109/ICC.2009.5198684","ee":"https://doi.org/10.1109/ICC.2009.5198684","url":"https://dblp.org/rec/conf/icc/GaoST09"}, "url":"URL#5146527" }, { "@score":"1", "@id":"5146528", "info":{"authors":{"author":[{"@pid":"93/1773","text":"Yuehong Gao"},{"@pid":"76/1584-1","text":"Xin Zhang 0001"},{"@pid":"52/146","text":"Yuming Jiang 0001"},{"@pid":"42/1986","text":"Jeong-woo Cho"}]},"title":"System Spectral Efficiency and Stability of 3G Networks: A Comparative Study.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GaoZJC09","doi":"10.1109/ICC.2009.5199507","ee":"https://doi.org/10.1109/ICC.2009.5199507","url":"https://dblp.org/rec/conf/icc/GaoZJC09"}, "url":"URL#5146528" }, { "@score":"1", "@id":"5146529", "info":{"authors":{"author":[{"@pid":"20/6898","text":"Feifei Gao"},{"@pid":"60/2536-6","text":"Rui Zhang 0006"},{"@pid":"98/153","text":"Ying-Chang Liang"}]},"title":"On Channel Estimation for OFDM Based Two-Way Relay Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GaoZL09","doi":"10.1109/ICC.2009.5199236","ee":"https://doi.org/10.1109/ICC.2009.5199236","url":"https://dblp.org/rec/conf/icc/GaoZL09"}, "url":"URL#5146529" }, { "@score":"1", "@id":"5146530", "info":{"authors":{"author":[{"@pid":"48/7222","text":"Denis Garagic"},{"@pid":"17/4650","text":"Bradley J. Rhodes"},{"@pid":"92/1294","text":"Neil A. Bomberger"},{"@pid":"10/7221","text":"Majid Zandipour"}]},"title":"Adaptive Mixture-Based Neural Network Approach for Higher-Level Fusion and Automated Behavior Monitoring.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GaragicRBZ09","doi":"10.1109/ICC.2009.5198703","ee":"https://doi.org/10.1109/ICC.2009.5198703","url":"https://dblp.org/rec/conf/icc/GaragicRBZ09"}, "url":"URL#5146530" }, { "@score":"1", "@id":"5146531", "info":{"authors":{"author":[{"@pid":"55/3829","text":"Rosario Giuseppe Garroppo"},{"@pid":"80/6788","text":"Stefano Giordano"},{"@pid":"79/5395","text":"Davide Iacono"}]},"title":"Experimental and Simulation Study of a WiMAX System in the Sea Port Scenario.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GarroppoGI09","doi":"10.1109/ICC.2009.5199013","ee":"https://doi.org/10.1109/ICC.2009.5199013","url":"https://dblp.org/rec/conf/icc/GarroppoGI09"}, "url":"URL#5146531" }, { "@score":"1", "@id":"5146532", "info":{"authors":{"author":[{"@pid":"81/7354","text":"Lars Geiger"},{"@pid":"20/6521","text":"Frank Dürr"},{"@pid":"r/KurtRothermel","text":"Kurt Rothermel"}]},"title":"On Contextcast: A Context-Aware Communication Mechanism.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GeigerDR09","doi":"10.1109/ICC.2009.5199239","ee":"https://doi.org/10.1109/ICC.2009.5199239","url":"https://dblp.org/rec/conf/icc/GeigerDR09"}, "url":"URL#5146532" }, { "@score":"1", "@id":"5146533", "info":{"authors":{"author":[{"@pid":"38/4505","text":"Xavier Gelabert"},{"@pid":"65/314","text":"Oriol Sallent"},{"@pid":"74/84","text":"Jordi Pérez-Romero"},{"@pid":"95/6471","text":"Ramón Agustí"}]},"title":"Exploiting the Operating Point in Sensing-Based Opportunistic Spectrum Access Scenarios.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GelabertSPA09","doi":"10.1109/ICC.2009.5199018","ee":"https://doi.org/10.1109/ICC.2009.5199018","url":"https://dblp.org/rec/conf/icc/GelabertSPA09"}, "url":"URL#5146533" }, { "@score":"1", "@id":"5146534", "info":{"authors":{"author":[{"@pid":"31/4238","text":"Dimitris Geneiatakis"},{"@pid":"16/6779","text":"Costas Lambrinoudakis"},{"@pid":"90/2058","text":"Georgios Kambourakis"},{"@pid":"31/7883","text":"Aggelos Kafkalas"},{"@pid":"84/3447","text":"Sven Ehlert"}]},"title":"A First Order Logic Security Verification Model for SIP.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GeneiatakisLKKE09","doi":"10.1109/ICC.2009.5198603","ee":"https://doi.org/10.1109/ICC.2009.5198603","url":"https://dblp.org/rec/conf/icc/GeneiatakisLKKE09"}, "url":"URL#5146534" }, { "@score":"1", "@id":"5146535", "info":{"authors":{"author":[{"@pid":"13/2427","text":"Rizwan Ghaffar"},{"@pid":"89/6199","text":"Raymond Knopp"}]},"title":"Spatial Interference Cancellation and Pairwise Error Probability Analysis.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GhaffarK09","doi":"10.1109/ICC.2009.5199471","ee":"https://doi.org/10.1109/ICC.2009.5199471","url":"https://dblp.org/rec/conf/icc/GhaffarK09"}, "url":"URL#5146535" }, { "@score":"1", "@id":"5146536", "info":{"authors":{"author":[{"@pid":"39/2124","text":"Abolfazl Ghassemi"},{"@pid":"g/TAGulliver","text":"T. Aaron Gulliver"}]},"title":"A Simplified Suboptimal Algorithm for Tone Reservation OFDM.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GhassemiG09","doi":"10.1109/ICC.2009.5198672","ee":"https://doi.org/10.1109/ICC.2009.5198672","url":"https://dblp.org/rec/conf/icc/GhassemiG09"}, "url":"URL#5146536" }, { "@score":"1", "@id":"5146537", "info":{"authors":{"author":[{"@pid":"49/5902","text":"Mabruk Gheryani"},{"@pid":"60/5001","text":"Zhiyuan Wu"},{"@pid":"53/5944","text":"Yousef R. Shayan"}]},"title":"Capacity and Performance of Adaptive MIMO System Based on Beam-Nulling.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GheryaniWS09","doi":"10.1109/ICC.2009.5198804","ee":"https://doi.org/10.1109/ICC.2009.5198804","url":"https://dblp.org/rec/conf/icc/GheryaniWS09"}, "url":"URL#5146537" }, { "@score":"1", "@id":"5146538", "info":{"authors":{"author":[{"@pid":"88/3248","text":"Birendra Ghimire"},{"@pid":"35/1027","text":"Gunther Auer"},{"@pid":"12/2168","text":"Harald Haas"}]},"title":"OFDMA-TDD Networks with Busy Burst Enabled Grid-of-Beam Selection.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GhimireAH09","doi":"10.1109/ICC.2009.5199231","ee":"https://doi.org/10.1109/ICC.2009.5199231","url":"https://dblp.org/rec/conf/icc/GhimireAH09"}, "url":"URL#5146538" }, { "@score":"1", "@id":"5146539", "info":{"authors":{"author":[{"@pid":"16/2199","text":"Paolo Giacomazzi"},{"@pid":"41/6943","text":"Gabriella Saddemi"}]},"title":"End-to-End Delay Approximation in Cascades of Generalized Processor Sharing Schedulers.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GiacomazziS09","doi":"10.1109/ICC.2009.5198985","ee":"https://doi.org/10.1109/ICC.2009.5198985","url":"https://dblp.org/rec/conf/icc/GiacomazziS09"}, "url":"URL#5146539" }, { "@score":"1", "@id":"5146540", "info":{"authors":{"author":[{"@pid":"18/3312","text":"Lorenza Giupponi"},{"@pid":"85/1355","text":"Christian Ibars"}]},"title":"Bayesian Potential Games to Model Cooperation for Cognitive Radios with Incomplete Information.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GiupponiI09","doi":"10.1109/ICC.2009.5198780","ee":"https://doi.org/10.1109/ICC.2009.5198780","url":"https://dblp.org/rec/conf/icc/GiupponiI09"}, "url":"URL#5146540" }, { "@score":"1", "@id":"5146541", "info":{"authors":{"author":[{"@pid":"77/5451","text":"Satashu Goel"},{"@pid":"42/4618","text":"Rohit Negi"}]},"title":"Analysis of Delay Statistics for the Queued-Code.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GoelN09","doi":"10.1109/ICC.2009.5198743","ee":"https://doi.org/10.1109/ICC.2009.5198743","url":"https://dblp.org/rec/conf/icc/GoelN09"}, "url":"URL#5146541" }, { "@score":"1", "@id":"5146542", "info":{"authors":{"author":[{"@pid":"55/7441","text":"Glauco Estácio Gonçalves"},{"@pid":"11/7884","text":"Gustavo G. B. Santos"},{"@pid":"50/6502","text":"Joseane Farias Fidalgo"},{"@pid":"10/1554","text":"Judith Kelner"},{"@pid":"s/DjamelSadok","text":"Djamel Fawzi Hadj Sadok"},{"@pid":"09/6789","text":"Stenio F. L. Fernandes"}]},"title":"On the Use of an ADSL2+ Testbed for Video Quality Assessment.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GoncalvesSFKSF09","doi":"10.1109/ICC.2009.5199269","ee":"https://doi.org/10.1109/ICC.2009.5199269","url":"https://dblp.org/rec/conf/icc/GoncalvesSFKSF09"}, "url":"URL#5146542" }, { "@score":"1", "@id":"5146543", "info":{"authors":{"author":[{"@pid":"92/2183","text":"Pejman Goudarzi"},{"@pid":"75/7881","text":"Farima Ayatollahi"},{"@pid":"95/7881","text":"Mohammad R. Nezami Ranjbar"}]},"title":"Enabling Differentiated QoS Based on Cross-Layer Optimization in Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GoudarziAR09","doi":"10.1109/ICC.2009.5198983","ee":"https://doi.org/10.1109/ICC.2009.5198983","url":"https://dblp.org/rec/conf/icc/GoudarziAR09"}, "url":"URL#5146543" }, { "@score":"1", "@id":"5146544", "info":{"authors":{"author":[{"@pid":"92/2183","text":"Pejman Goudarzi"},{"@pid":"87/10475","text":"Mehdi Hosseinpour"}]},"title":"Optimal Rate Allocation for Loss Sensitive Applications in Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GoudarziH09","doi":"10.1109/ICC.2009.5199284","ee":"https://doi.org/10.1109/ICC.2009.5199284","url":"https://dblp.org/rec/conf/icc/GoudarziH09"}, "url":"URL#5146544" }, { "@score":"1", "@id":"5146545", "info":{"authors":{"author":[{"@pid":"72/2765","text":"David Gregoratti"},{"@pid":"97/2295","text":"Xavier Mestre"}]},"title":"Diversity Analysis of a Randomized Distributed Space-Time Coding in an Amplify and Forward Relay Channel.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GregorattiM09","doi":"10.1109/ICC.2009.5198941","ee":"https://doi.org/10.1109/ICC.2009.5198941","url":"https://dblp.org/rec/conf/icc/GregorattiM09"}, "url":"URL#5146545" }, { "@score":"1", "@id":"5146546", "info":{"authors":{"author":[{"@pid":"18/7884","text":"Aden Grue"},{"@pid":"g/WayneDGrover","text":"Wayne D. Grover"},{"@pid":"08/7881","text":"Matthieu Clouqueur"},{"@pid":"43/5035","text":"Dominic A. Schupke"},{"@pid":"70/7882","text":"Dimitri Baloukov"},{"@pid":"42/5523","text":"Diane Prisca Onguetou"},{"@pid":"09/7884","text":"Brian Forst"}]},"title":"CAPEX Costs of Lightly Loaded Restorable Networks under a Consistent WDM Layer Cost Model.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GrueGCSBOF09","doi":"10.1109/ICC.2009.5198808","ee":"https://doi.org/10.1109/ICC.2009.5198808","url":"https://dblp.org/rec/conf/icc/GrueGCSBOF09"}, "url":"URL#5146546" }, { "@score":"1", "@id":"5146547", "info":{"authors":{"author":[{"@pid":"72/2733","text":"Yanying Gu"},{"@pid":"01/6745","text":"R. Venkatesha Prasad"},{"@pid":"23/3922","text":"Ignas G. Niemegeers"}]},"title":"On the Stability of Ad Hoc Group Mobility Models.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GuPN09","doi":"10.1109/ICC.2009.5199267","ee":"https://doi.org/10.1109/ICC.2009.5199267","url":"https://dblp.org/rec/conf/icc/GuPN09"}, "url":"URL#5146547" }, { "@score":"1", "@id":"5146548", "info":{"authors":{"author":[{"@pid":"24/5237","text":"Zhangyu Guan"},{"@pid":"75/4570","text":"Dongfeng Yuan"},{"@pid":"48/2947-1","text":"Haixia Zhang 0001"}]},"title":"Co-Opetition Strategy for Collaborative Multiuser Multimedia Resource Allocation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GuanYZ09","doi":"10.1109/ICC.2009.5198864","ee":"https://doi.org/10.1109/ICC.2009.5198864","url":"https://dblp.org/rec/conf/icc/GuanYZ09"}, "url":"URL#5146548" }, { "@score":"1", "@id":"5146549", "info":{"authors":{"author":[{"@pid":"40/4278","text":"Lionel Gueguen"},{"@pid":"122/8238","text":"Berna Sayraç"},{"@pid":"96/7883","text":"David Depierre"}]},"title":"Spectogram Reconstruction from Random Sampling: Application to the GSM Band Sensing.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GueguenSD09","doi":"10.1109/ICC.2009.5199475","ee":"https://doi.org/10.1109/ICC.2009.5199475","url":"https://dblp.org/rec/conf/icc/GueguenSD09"}, "url":"URL#5146549" }, { "@score":"1", "@id":"5146550", "info":{"authors":{"author":[{"@pid":"36/6793","text":"Mamoun Guenach"},{"@pid":"49/878","text":"Jérôme Louveaux"},{"@pid":"v/LucVandendorpe","text":"Luc Vandendorpe"},{"@pid":"21/6087","text":"Phil Whiting"},{"@pid":"49/6382","text":"Jochen Maes"},{"@pid":"53/3039","text":"Michaël Peeters"}]},"title":"Performance Analysis of the Signal-to-Noise Ratio Assisted Crosstalk Channel Estimation for DSL Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GuenachLVWMP09","doi":"10.1109/ICC.2009.5199317","ee":"https://doi.org/10.1109/ICC.2009.5199317","url":"https://dblp.org/rec/conf/icc/GuenachLVWMP09"}, "url":"URL#5146550" }, { "@score":"1", "@id":"5146551", "info":{"authors":{"author":[{"@pid":"86/4491","text":"Mina Guirguis"},{"@pid":"56/7882","text":"Hideo Goto"}]},"title":"HELP: // Hypertext In-Emergency Leveraging Protocol.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GuirguisG09","doi":"10.1109/ICC.2009.5199051","ee":"https://doi.org/10.1109/ICC.2009.5199051","url":"https://dblp.org/rec/conf/icc/GuirguisG09"}, "url":"URL#5146551" }, { "@score":"1", "@id":"5146552", "info":{"authors":{"author":[{"@pid":"92/4079","text":"Ashwin Gumaste"},{"@pid":"15/5903","text":"Mohit Chamania"},{"@pid":"30/1610","text":"Admela Jukan"}]},"title":"An Evolutionary Approach to End-to-End Addressing and Routing in All-Ethernet Wide-Area Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GumasteCJ09","doi":"10.1109/ICC.2009.5198732","ee":"https://doi.org/10.1109/ICC.2009.5198732","url":"https://dblp.org/rec/conf/icc/GumasteCJ09"}, "url":"URL#5146552" }, { "@score":"1", "@id":"5146553", "info":{"authors":{"author":[{"@pid":"92/4079","text":"Ashwin Gumaste"},{"@pid":"21/1550-1","text":"Jianping Wang 0001"},{"@pid":"49/5720","text":"Abhay Karandikar"},{"@pid":"11/6297","text":"Nasir Ghani"}]},"title":"MultiHop Light-Trails (MLT) - A Solution to Extended Metro Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GumasteWKG09","doi":"10.1109/ICC.2009.5199202","ee":"https://doi.org/10.1109/ICC.2009.5199202","url":"https://dblp.org/rec/conf/icc/GumasteWKG09"}, "url":"URL#5146553" }, { "@score":"1", "@id":"5146554", "info":{"authors":{"author":[{"@pid":"10/7882","text":"Haiyou Guo"},{"@pid":"96/5737","text":"Honglin Hu"},{"@pid":"48/450-1","text":"Yang Yang 0001"}]},"title":"Cyclostationary Signatures in OFDM-Based Cognitive Radios with Cyclic Delay Diversity.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GuoHY09","doi":"10.1109/ICC.2009.5198879","ee":"https://doi.org/10.1109/ICC.2009.5198879","url":"https://dblp.org/rec/conf/icc/GuoHY09"}, "url":"URL#5146554" }, { "@score":"1", "@id":"5146555", "info":{"authors":{"author":[{"@pid":"70/2221-3","text":"Hui Guo 0003"},{"@pid":"41/3068-9","text":"Jiang Li 0009"},{"@pid":"84/4625","text":"Yi Qian"}]},"title":"Modeling and Evaluation of Homing-Pigeon Based Delay Tolerant Networks with Periodic Scheduling.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GuoLQ09","doi":"10.1109/ICC.2009.5199190","ee":"https://doi.org/10.1109/ICC.2009.5199190","url":"https://dblp.org/rec/conf/icc/GuoLQ09"}, "url":"URL#5146555" }, { "@score":"1", "@id":"5146556", "info":{"authors":{"author":[{"@pid":"70/2221-3","text":"Hui Guo 0003"},{"@pid":"84/4625-1","text":"Yi Qian 0001"},{"@pid":"45/3906","text":"Kejie Lu"},{"@pid":"71/7025","text":"Nader Moayeri"}]},"title":"Backbone Construction for Heterogeneous Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GuoQLM09","doi":"10.1109/ICC.2009.5198773","ee":"https://doi.org/10.1109/ICC.2009.5198773","url":"https://dblp.org/rec/conf/icc/GuoQLM09"}, "url":"URL#5146556" }, { "@score":"1", "@id":"5146557", "info":{"authors":{"author":[{"@pid":"g/ErenGurses","text":"Eren Gürses"},{"@pid":"07/3483","text":"Yuan Lin"},{"@pid":"b/RaoufBoutaba","text":"Raouf Boutaba"}]},"title":"Distributed Quality-Lifetime Maximization in Wireless Video Sensor Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GursesLB09","doi":"10.1109/ICC.2009.5198933","ee":"https://doi.org/10.1109/ICC.2009.5198933","url":"https://dblp.org/rec/conf/icc/GursesLB09"}, "url":"URL#5146557" }, { "@score":"1", "@id":"5146558", "info":{"authors":{"author":[{"@pid":"g/ErenGurses","text":"Eren Gürses"},{"@pid":"62/4290","text":"Jin Xiao"},{"@pid":"b/RaoufBoutaba","text":"Raouf Boutaba"}]},"title":"Service Engineering for Inter-Domain Overlay Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GursesXB09","doi":"10.1109/ICC.2009.5199455","ee":"https://doi.org/10.1109/ICC.2009.5199455","url":"https://dblp.org/rec/conf/icc/GursesXB09"}, "url":"URL#5146558" }, { "@score":"1", "@id":"5146559", "info":{"authors":{"author":[{"@pid":"94/6423","text":"Christian Guthy"},{"@pid":"34/5115","text":"Wolfgang Utschick"},{"@pid":"09/1254","text":"Guido Dietl"}]},"title":"A User Grouping Method for Maximum Weighted Sum Capacity Gain.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/GuthyUD09","doi":"10.1109/ICC.2009.5198687","ee":"https://doi.org/10.1109/ICC.2009.5198687","url":"https://dblp.org/rec/conf/icc/GuthyUD09"}, "url":"URL#5146559" }, { "@score":"1", "@id":"5146560", "info":{"authors":{"author":[{"@pid":"30/36","text":"Zoran Hadzi-Velkov"},{"@pid":"90/2818","text":"Nikola Zlatanov"},{"@pid":"13/5195","text":"George K. Karagiannidis"}]},"title":"An Accurate Approximation to the Distribution of the Sum of Equally Correlated Nakagami-m Envelopes and Its Application in Equal Gain Diversity Receivers.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Hadzi-VelkovZK09","doi":"10.1109/ICC.2009.5198714","ee":"https://doi.org/10.1109/ICC.2009.5198714","url":"https://dblp.org/rec/conf/icc/Hadzi-VelkovZK09"}, "url":"URL#5146560" }, { "@score":"1", "@id":"5146561", "info":{"authors":{"author":[{"@pid":"32/6842","text":"Mahdi Hajiaghayi"},{"@pid":"61/1489-1","text":"Min Dong 0001"},{"@pid":"86/2829","text":"Ben Liang 0001"}]},"title":"Using Limited Feedback in Power Allocation Design for a Two-Hop Relay OFDM System.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HajiaghayiDL09","doi":"10.1109/ICC.2009.5199558","ee":"https://doi.org/10.1109/ICC.2009.5199558","url":"https://dblp.org/rec/conf/icc/HajiaghayiDL09"}, "url":"URL#5146561" }, { "@score":"1", "@id":"5146562", "info":{"authors":{"author":[{"@pid":"91/2937","text":"Mohamed Hamdi"},{"@pid":"28/3198","text":"Noureddine Boudriga"}]},"title":"A Progressive Chaotic MPEG-4 Video Encryption Scheme for Wireless Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HamdiB09","doi":"10.1109/ICC.2009.5305955","ee":"https://doi.org/10.1109/ICC.2009.5305955","url":"https://dblp.org/rec/conf/icc/HamdiB09"}, "url":"URL#5146562" }, { "@score":"1", "@id":"5146563", "info":{"authors":{"author":[{"@pid":"17/7884","text":"Ali Hamieh"},{"@pid":"75/178","text":"Jalel Ben-Othman"}]},"title":"Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HamiehB09","doi":"10.1109/ICC.2009.5198912","ee":"https://doi.org/10.1109/ICC.2009.5198912","url":"https://dblp.org/rec/conf/icc/HamiehB09"}, "url":"URL#5146563" }, { "@score":"1", "@id":"5146564", "info":{"authors":{"author":[{"@pid":"17/7884","text":"Ali Hamieh"},{"@pid":"75/178","text":"Jalel Ben-Othman"},{"@pid":"18/3492","text":"Abdelhak Mourad Guéroui"},{"@pid":"05/720","text":"Farid Naït-Abdesselam"}]},"title":"Detecting Greedy Behaviors by Linear Regression in Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HamiehBGN09","doi":"10.1109/ICC.2009.5198908","ee":"https://doi.org/10.1109/ICC.2009.5198908","url":"https://dblp.org/rec/conf/icc/HamiehBGN09"}, "url":"URL#5146564" }, { "@score":"1", "@id":"5146565", "info":{"authors":{"author":[{"@pid":"70/1648","text":"Chenggao Han"},{"@pid":"70/3441","text":"Takeshi Hashimoto"},{"@pid":"14/1190","text":"Naoki Suehiro"}]},"title":"Constellation Rotated Vector OFDM and Its Performance over Rayleigh Fading Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HanHS09","doi":"10.1109/ICC.2009.5198846","ee":"https://doi.org/10.1109/ICC.2009.5198846","url":"https://dblp.org/rec/conf/icc/HanHS09"}, "url":"URL#5146565" }, { "@score":"1", "@id":"5146566", "info":{"authors":{"author":[{"@pid":"00/3507","text":"Bo Han 0001"},{"@pid":"63/5501","text":"Lusheng Ji"},{"@pid":"15/4697","text":"Seungjoon Lee"},{"@pid":"72/849","text":"Robert R. Miller"},{"@pid":"b/BobbyBhattacharjee","text":"Bobby Bhattacharjee"}]},"title":"Channel Access Throttling for Overlapping BSS Management.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HanJLMB09","doi":"10.1109/ICC.2009.5198815","ee":"https://doi.org/10.1109/ICC.2009.5198815","url":"https://dblp.org/rec/conf/icc/HanJLMB09"}, "url":"URL#5146566" }, { "@score":"1", "@id":"5146567", "info":{"authors":{"author":[{"@pid":"13/7884","text":"Hyeon-Seung Han"},{"@pid":"29/6075","text":"Seokhwan Park"},{"@pid":"20/6158","text":"Inkyu Lee"}]},"title":"Improved Vector Perturbation with Modulo Loss Reduction for Multiuser Downlink Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HanPL09","doi":"10.1109/ICC.2009.5199075","ee":"https://doi.org/10.1109/ICC.2009.5199075","url":"https://dblp.org/rec/conf/icc/HanPL09"}, "url":"URL#5146567" }, { "@score":"1", "@id":"5146568", "info":{"authors":{"author":[{"@pid":"28/6582","text":"Muhammad Fainan Hanif"},{"@pid":"54/554","text":"Mansoor Shafi"},{"@pid":"57/5882-1","text":"Peter J. Smith 0001"},{"@pid":"64/3238","text":"Pawel A. Dmochowski"}]},"title":"Interference and Deployment Issues for Cognitive Radio Systems in Shadowing Environments.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HanifSSD09","doi":"10.1109/ICC.2009.5199089","ee":"https://doi.org/10.1109/ICC.2009.5199089","url":"https://dblp.org/rec/conf/icc/HanifSSD09"}, "url":"URL#5146568" }, { "@score":"1", "@id":"5146569", "info":{"authors":{"author":[{"@pid":"44/5571","text":"Wibowo Hardjawana"},{"@pid":"84/3821","text":"Branka Vucetic"},{"@pid":"59/6828-1","text":"Yonghui Li 0001"}]},"title":"Cooperative Precoding and Beamforming for Co-Existing Multi-User MIMO Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HardjawanaVL09","doi":"10.1109/ICC.2009.5198861","ee":"https://doi.org/10.1109/ICC.2009.5198861","url":"https://dblp.org/rec/conf/icc/HardjawanaVL09"}, "url":"URL#5146569" }, { "@score":"1", "@id":"5146570", "info":{"authors":{"author":[{"@pid":"73/7882","text":"Ben Harrison"},{"@pid":"24/6281-1","text":"Alan Marshall 0001"}]},"title":"Location Based Sleep Scheduling for Target Tracking Applications in Smart Space Environments.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HarrisonM09","doi":"10.1109/ICC.2009.5199145","ee":"https://doi.org/10.1109/ICC.2009.5199145","url":"https://dblp.org/rec/conf/icc/HarrisonM09"}, "url":"URL#5146570" }, { "@score":"1", "@id":"5146571", "info":{"authors":{"author":[{"@pid":"31/6804","text":"Willie K. Harrison"},{"@pid":"45/6772","text":"Steven W. McLaughlin"}]},"title":"Physical-Layer Security: Combining Error Control Coding and Cryptography.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HarrisonM09a","doi":"10.1109/ICC.2009.5199337","ee":"https://doi.org/10.1109/ICC.2009.5199337","url":"https://dblp.org/rec/conf/icc/HarrisonM09a"}, "url":"URL#5146571" }, { "@score":"1", "@id":"5146572", "info":{"authors":{"author":[{"@pid":"02/1838","text":"Mohammad Masud Hasan"},{"@pid":"p/RaviPrakash","text":"Ravi Prakash 0001"},{"@pid":"28/4351","text":"Jason P. Jue"}]},"title":"Dynamic Coexistence of Frequency Hopping Networks Using Parallel and Gaussian Allocations.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HasanPJ09","doi":"10.1109/ICC.2009.5198954","ee":"https://doi.org/10.1109/ICC.2009.5198954","url":"https://dblp.org/rec/conf/icc/HasanPJ09"}, "url":"URL#5146572" }, { "@score":"1", "@id":"5146573", "info":{"authors":{"author":[{"@pid":"26/1076","text":"Jun Hasegawa"},{"@pid":"12/1767","text":"Hiroyuki Yomo"},{"@pid":"11/3972","text":"Yoshihisa Kondo"},{"@pid":"06/2334","text":"Peter Davis"},{"@pid":"95/5659","text":"Ryutaro Suzuki"},{"@pid":"43/3354","text":"Sadao Obana"},{"@pid":"68/90","text":"Katsumi Sakakibara"}]},"title":"Bidirectional Packet Aggregation and Coding for VoIP Transmission in Wireless Multi-Hop Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HasegawaYKDSOS09","doi":"10.1109/ICC.2009.5198784","ee":"https://doi.org/10.1109/ICC.2009.5198784","url":"https://dblp.org/rec/conf/icc/HasegawaYKDSOS09"}, "url":"URL#5146573" }, { "@score":"1", "@id":"5146574", "info":{"authors":{"author":[{"@pid":"72/2821","text":"Fazirulhisyam Hashim"},{"@pid":"76/4975","text":"Abbas Jamalipour"}]},"title":"On Accurate and Scalable Anomaly Detection in Next Generation Mobile Network.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HashimJ09","doi":"10.1109/ICC.2009.5199232","ee":"https://doi.org/10.1109/ICC.2009.5199232","url":"https://dblp.org/rec/conf/icc/HashimJ09"}, "url":"URL#5146574" }, { "@score":"1", "@id":"5146575", "info":{"authors":{"author":[{"@pid":"12/4065","text":"Sonia A. Hashish"},{"@pid":"34/4894","text":"Ahmed Karmouch"}]},"title":"Mobility-Based Generic Infrastructure for Large Scale Sensor Network Architecture.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HashishK09","doi":"10.1109/ICC.2009.5199188","ee":"https://doi.org/10.1109/ICC.2009.5199188","url":"https://dblp.org/rec/conf/icc/HashishK09"}, "url":"URL#5146575" }, { "@score":"1", "@id":"5146576", "info":{"authors":{"author":[{"@pid":"81/739","text":"Christoph Hausl"},{"@pid":"08/4660","text":"Tobias Lutz"},{"@pid":"k/RalfKoetter","text":"Ralf Koetter"}]},"title":"Distributed Turbo Coding with Information Transfer via Timing of the Half-Duplex Relay-Phases.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HauslLK09","doi":"10.1109/ICC.2009.5198937","ee":"https://doi.org/10.1109/ICC.2009.5198937","url":"https://dblp.org/rec/conf/icc/HauslLK09"}, "url":"URL#5146576" }, { "@score":"1", "@id":"5146577", "info":{"authors":{"author":[{"@pid":"05/6200","text":"Veria Havary-Nassab"},{"@pid":"91/6648","text":"Shahram Shahbazpanahi"},{"@pid":"11/2825","text":"Ali Grami"}]},"title":"General-Rank Beamforming for Multi-Antenna Relaying Schemes.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Havary-NassabSG09","doi":"10.1109/ICC.2009.5199046","ee":"https://doi.org/10.1109/ICC.2009.5199046","url":"https://dblp.org/rec/conf/icc/Havary-NassabSG09"}, "url":"URL#5146577" }, { "@score":"1", "@id":"5146578", "info":{"authors":{"author":[{"@pid":"83/7380","text":"Thaier Hayajneh"},{"@pid":"11/748","text":"Prashant Krishnamurthy"},{"@pid":"58/4098","text":"David Tipper"},{"@pid":"17/4306-2","text":"Tae-Hoon Kim 0002"}]},"title":"Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HayajnehKTK09","doi":"10.1109/ICC.2009.5198910","ee":"https://doi.org/10.1109/ICC.2009.5198910","url":"https://dblp.org/rec/conf/icc/HayajnehKTK09"}, "url":"URL#5146578" }, { "@score":"1", "@id":"5146579", "info":{"authors":{"author":[{"@pid":"78/7883","text":"Richard Haywood"},{"@pid":"11/7882","text":"Saty Mukherjee"},{"@pid":"68/1206","text":"Xiao-Hong Peng"}]},"title":"Investigation of H.264 Video Streaming over an IEEE 802.11e EDCA Wireless Testbed.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HaywoodMP09","doi":"10.1109/ICC.2009.5199101","ee":"https://doi.org/10.1109/ICC.2009.5199101","url":"https://dblp.org/rec/conf/icc/HaywoodMP09"}, "url":"URL#5146579" }, { "@score":"1", "@id":"5146580", "info":{"authors":{"author":[{"@pid":"52/7882","text":"Fangming He"},{"@pid":"82/3205","text":"Hong Man"},{"@pid":"87/6116","text":"Didem Kivanc"},{"@pid":"89/7883","text":"Bruce McNair"}]},"title":"EPSON: Enhanced Physical Security in OFDM Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HeMKM09","doi":"10.1109/ICC.2009.5198999","ee":"https://doi.org/10.1109/ICC.2009.5198999","url":"https://dblp.org/rec/conf/icc/HeMKM09"}, "url":"URL#5146580" }, { "@score":"1", "@id":"5146581", "info":{"authors":{"author":[{"@pid":"27/1201","text":"Ben He"},{"@pid":"95/2265","text":"Robert Schober"}]},"title":"Bit-Interleaved Coded Modulation for Hybrid RF/FSO Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HeS09","doi":"10.1109/ICC.2009.5198787","ee":"https://doi.org/10.1109/ICC.2009.5198787","url":"https://dblp.org/rec/conf/icc/HeS09"}, "url":"URL#5146581" }, { "@score":"1", "@id":"5146582", "info":{"authors":{"author":[{"@pid":"38/3773","text":"Andreas Hecker"},{"@pid":"64/5604","text":"Thomas Kürner"}]},"title":"Introduction of Measurement-Based Estimation of Handover Attempts for Automatic Planning of Mobile Radio Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HeckerK09","doi":"10.1109/ICC.2009.5199099","ee":"https://doi.org/10.1109/ICC.2009.5199099","url":"https://dblp.org/rec/conf/icc/HeckerK09"}, "url":"URL#5146582" }, { "@score":"1", "@id":"5146583", "info":{"authors":{"author":[{"@pid":"94/1260","text":"Tobias Heer"},{"@pid":"98/7880","text":"René Hummen"},{"@pid":"89/7882","text":"Miika Komu"},{"@pid":"57/1034-1","text":"Stefan Götz 0001"},{"@pid":"w/KlausWehrle","text":"Klaus Wehrle"}]},"title":"End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HeerHKGW09","doi":"10.1109/ICC.2009.5198984","ee":"https://doi.org/10.1109/ICC.2009.5198984","url":"https://dblp.org/rec/conf/icc/HeerHKGW09"}, "url":"URL#5146583" }, { "@score":"1", "@id":"5146584", "info":{"authors":{"author":[{"@pid":"60/7882","text":"M. R. Heidarpour"},{"@pid":"88/8786","text":"Mahmoud Modarres-Hashemi"},{"@pid":"82/2216","text":"Mohammadali Khosravifard"},{"@pid":"g/TAGulliver","text":"T. Aaron Gulliver"}]},"title":"Improving the Performance of LP Decoders for Cyclic Codes.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HeidarpourMKG09","doi":"10.1109/ICC.2009.5305944","ee":"https://doi.org/10.1109/ICC.2009.5305944","url":"https://dblp.org/rec/conf/icc/HeidarpourMKG09"}, "url":"URL#5146584" }, { "@score":"1", "@id":"5146585", "info":{"authors":{"author":[{"@pid":"99/5469","text":"Cédric Herzet"},{"@pid":"65/7822","text":"Velotiaray Toto-Zarasoa"},{"@pid":"93/1402","text":"Aline Roumy"}]},"title":"Error Resilient Non-Asymmetric Slepian-Wolf Coding.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HerzetTR09","doi":"10.1109/ICC.2009.5199002","ee":"https://doi.org/10.1109/ICC.2009.5199002","url":"https://dblp.org/rec/conf/icc/HerzetTR09"}, "url":"URL#5146585" }, { "@score":"1", "@id":"5146586", "info":{"authors":{"author":[{"@pid":"11/7883","text":"Marnix Heskamp"},{"@pid":"s/KeesSlump","text":"Cornelis H. Slump"}]},"title":"Sub-Noise Primary User Detection by Cross-Correlation.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HeskampS09","doi":"10.1109/ICC.2009.5199496","ee":"https://doi.org/10.1109/ICC.2009.5199496","url":"https://dblp.org/rec/conf/icc/HeskampS09"}, "url":"URL#5146586" }, { "@score":"1", "@id":"5146587", "info":{"authors":{"author":[{"@pid":"31/5967","text":"Matthias Hesse"},{"@pid":"94/4933","text":"Jérôme Lebrun"},{"@pid":"21/788","text":"Lutz H.-J. Lampe"},{"@pid":"37/524","text":"Luc Deneire"}]},"title":"Separable Implementation of L2-Orthogonal STC CPM with Fast Decoding.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HesseLLD09","doi":"10.1109/ICC.2009.5199452","ee":"https://doi.org/10.1109/ICC.2009.5199452","url":"https://dblp.org/rec/conf/icc/HesseLLD09"}, "url":"URL#5146587" }, { "@score":"1", "@id":"5146588", "info":{"authors":{"author":[{"@pid":"06/5034","text":"James E. Hicks"},{"@pid":"91/7881","text":"Tim Meehan"},{"@pid":"41/2332","text":"Frank Kragh"}]},"title":"Maximum a Posteriori Bit-Unstuffing.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HicksMK09","doi":"10.1109/ICC.2009.5199172","ee":"https://doi.org/10.1109/ICC.2009.5199172","url":"https://dblp.org/rec/conf/icc/HicksMK09"}, "url":"URL#5146588" }, { "@score":"1", "@id":"5146589", "info":{"authors":{"author":[{"@pid":"60/1147","text":"Satoru Higashino"},{"@pid":"13/7883","text":"Shoei Kobayashi"},{"@pid":"39/7884","text":"Tamotsu Yamagami"}]},"title":"Matched Spectral-Null Code with Run-Length Limitation for Optical Recording Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HigashinoKY09","doi":"10.1109/ICC.2009.5199169","ee":"https://doi.org/10.1109/ICC.2009.5199169","url":"https://dblp.org/rec/conf/icc/HigashinoKY09"}, "url":"URL#5146589" }, { "@score":"1", "@id":"5146590", "info":{"authors":{"author":[{"@pid":"30/7881","text":"Yosuke Himura"},{"@pid":"66/1199","text":"Kensuke Fukuda"},{"@pid":"02/4751","text":"Kenjiro Cho"},{"@pid":"41/6012","text":"Hiroshi Esaki"}]},"title":"An Automatic and Dynamic Parameter Tuning of a Statistics-Based Anomaly Detection Algorithm.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HimuraFCE09","doi":"10.1109/ICC.2009.5198722","ee":"https://doi.org/10.1109/ICC.2009.5198722","url":"https://dblp.org/rec/conf/icc/HimuraFCE09"}, "url":"URL#5146590" }, { "@score":"1", "@id":"5146591", "info":{"authors":{"author":[{"@pid":"23/6247","text":"Roberto C. Hincapié"},{"@pid":"89/5992-129","text":"Li Zhang 0129"},{"@pid":"181/2667-8","text":"Jian Tang 0008"},{"@pid":"64/4394","text":"Guoliang Xue"},{"@pid":"39/2509","text":"Richard S. Wolff"},{"@pid":"15/3384","text":"Roberto Bustamante"}]},"title":"Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HincapieZTXWB09","doi":"10.1109/ICC.2009.5198977","ee":"https://doi.org/10.1109/ICC.2009.5198977","url":"https://dblp.org/rec/conf/icc/HincapieZTXWB09"}, "url":"URL#5146591" }, { "@score":"1", "@id":"5146592", "info":{"authors":{"author":[{"@pid":"41/417","text":"Chin Keong Ho"},{"@pid":"55/7881","text":"Kiran T. Gowda"},{"@pid":"46/3348","text":"Sumei Sun"}]},"title":"A Generalized Two-Way Relay Channel with Private Information for the Relay.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HoGS09","doi":"10.1109/ICC.2009.5198611","ee":"https://doi.org/10.1109/ICC.2009.5198611","url":"https://dblp.org/rec/conf/icc/HoGS09"}, "url":"URL#5146592" }, { "@score":"1", "@id":"5146593", "info":{"authors":{"author":[{"@pid":"50/5937","text":"Quang-Dung Ho"},{"@pid":"41/2926","text":"Tho Le-Ngoc"}]},"title":"Efficient Algorithms for Non-Realtime Video Multicasting in Wireless Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HoL09","doi":"10.1109/ICC.2009.5198968","ee":"https://doi.org/10.1109/ICC.2009.5198968","url":"https://dblp.org/rec/conf/icc/HoL09"}, "url":"URL#5146593" }, { "@score":"1", "@id":"5146594", "info":{"authors":{"author":[{"@pid":"17/4700","text":"Felix Hoffmann"},{"@pid":"80/1629","text":"Daniel Medina"}]},"title":"Optimum Internet Gateway Selection in Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HoffmannM09","doi":"10.1109/ICC.2009.5199296","ee":"https://doi.org/10.1109/ICC.2009.5199296","url":"https://dblp.org/rec/conf/icc/HoffmannM09"}, "url":"URL#5146594" }, { "@score":"1", "@id":"5146595", "info":{"authors":{"author":[{"@pid":"73/7706","text":"Thomas Holleczek"},{"@pid":"24/2529","text":"Verena Venus"},{"@pid":"48/4374","text":"Susanne Naegele-Jackson"}]},"title":"Statistical Analysis of IP Delay Measurements as a Basis for Network Alert Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HolleczekVN09","doi":"10.1109/ICC.2009.5199487","ee":"https://doi.org/10.1109/ICC.2009.5199487","url":"https://dblp.org/rec/conf/icc/HolleczekVN09"}, "url":"URL#5146595" }, { "@score":"1", "@id":"5146596", "info":{"authors":{"author":[{"@pid":"46/2102","text":"Jue Hong"},{"@pid":"c/JiannongCao","text":"Jiannong Cao 0001"},{"@pid":"98/3150","text":"Wenzhong Li"},{"@pid":"24/3318","text":"Sanglu Lu"},{"@pid":"37/5760","text":"Daoxu Chen"}]},"title":"Sleeping Schedule-Aware Minimum Latency Broadcast in Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HongCLLC09","doi":"10.1109/ICC.2009.5199463","ee":"https://doi.org/10.1109/ICC.2009.5199463","url":"https://dblp.org/rec/conf/icc/HongCLLC09"}, "url":"URL#5146596" }, { "@score":"1", "@id":"5146597", "info":{"authors":{"author":[{"@pid":"08/6048","text":"Reza Hoshyar"},{"@pid":"18/380","text":"Rahim Tafazolli"}]},"title":"Performance Evaluation of HARQ Schemes for Cooperative Regenerative Relaying.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HoshyarT09","doi":"10.1109/ICC.2009.5199321","ee":"https://doi.org/10.1109/ICC.2009.5199321","url":"https://dblp.org/rec/conf/icc/HoshyarT09"}, "url":"URL#5146597" }, { "@score":"1", "@id":"5146598", "info":{"authors":{"author":[{"@pid":"70/7883","text":"Tareq Hossain"},{"@pid":"65/2576-1","text":"Yi Cui 0001"},{"@pid":"41/5526-1","text":"Yuan Xue 0001"}]},"title":"Rate Distortion Optimization for Mesh-Based P2P Video Streaming.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HossainCX09","doi":"10.1109/ICC.2009.5199392","ee":"https://doi.org/10.1109/ICC.2009.5199392","url":"https://dblp.org/rec/conf/icc/HossainCX09"}, "url":"URL#5146598" }, { "@score":"1", "@id":"5146599", "info":{"authors":{"author":[{"@pid":"09/2823","text":"Iraj Hosseini"},{"@pid":"62/6601","text":"Norman C. Beaulieu"}]},"title":"Low-Complexity Multisampling Multiuser Detector for Time-Hopping UWB Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HosseiniB09","doi":"10.1109/ICC.2009.5199161","ee":"https://doi.org/10.1109/ICC.2009.5199161","url":"https://dblp.org/rec/conf/icc/HosseiniB09"}, "url":"URL#5146599" }, { "@score":"1", "@id":"5146600", "info":{"authors":{"author":[{"@pid":"63/7178","text":"Ronghui Hou"},{"@pid":"81/5546","text":"King-Shan Lui"},{"@pid":"61/2422","text":"Ka-Cheong Leung"},{"@pid":"04/2169","text":"Fred Baker"}]},"title":"Approximation Algorithm for QoS Routing with Multiple Additive Constraints.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HouLLB09","doi":"10.1109/ICC.2009.5198760","ee":"https://doi.org/10.1109/ICC.2009.5198760","url":"https://dblp.org/rec/conf/icc/HouLLB09"}, "url":"URL#5146600" }, { "@score":"1", "@id":"5146601", "info":{"authors":{"author":[{"@pid":"31/7822","text":"Heykel Houas"},{"@pid":"07/6886","text":"Inbar Fijalkow"},{"@pid":"90/2036","text":"Cléo Baras"}]},"title":"Resources Allocation for the Transmission of Scalable Images on OFDM Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HouasFB09","doi":"10.1109/ICC.2009.5199415","ee":"https://doi.org/10.1109/ICC.2009.5199415","url":"https://dblp.org/rec/conf/icc/HouasFB09"}, "url":"URL#5146601" }, { "@score":"1", "@id":"5146602", "info":{"authors":{"author":[{"@pid":"09/2348","text":"Christian Hoymann"},{"@pid":"13/7881","text":"Laetitia Falconetti"},{"@pid":"47/3340","text":"Rohit Gupta"}]},"title":"Distributed Uplink Signal Processing of Cooperating Base Stations Based on IQ Sample Exchange.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HoymannFG09","doi":"10.1109/ICC.2009.5198939","ee":"https://doi.org/10.1109/ICC.2009.5198939","url":"https://dblp.org/rec/conf/icc/HoymannFG09"}, "url":"URL#5146602" }, { "@score":"1", "@id":"5146603", "info":{"authors":{"author":[{"@pid":"62/7881","text":"Chieh-Hung Hsieh"},{"@pid":"25/6603","text":"Guu-chang Yang"},{"@pid":"28/3606","text":"Cheng-Yuan Chang"},{"@pid":"24/5195","text":"Wing C. Kwong"}]},"title":"Constructions on 2D Wavelength-Time Codes for CDMA Fiber-Optic Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HsiehYCK09","doi":"10.1109/ICC.2009.5198849","ee":"https://doi.org/10.1109/ICC.2009.5198849","url":"https://dblp.org/rec/conf/icc/HsiehYCK09"}, "url":"URL#5146603" }, { "@score":"1", "@id":"5146604", "info":{"authors":{"author":[{"@pid":"95/4080","text":"C.-Y. Hsu"},{"@pid":"93/6628","text":"Stevan M. Berber"}]},"title":"Prototyping of a Pass-Band Chaos-Based CDMA System in FPGA Technology.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HsuB09","doi":"10.1109/ICC.2009.5305941","ee":"https://doi.org/10.1109/ICC.2009.5305941","url":"https://dblp.org/rec/conf/icc/HsuB09"}, "url":"URL#5146604" }, { "@score":"1", "@id":"5146605", "info":{"authors":{"author":[{"@pid":"51/944-5","text":"Hai Huang 0005"},{"@pid":"49/1185","text":"Zhenfu Cao"}]},"title":"An Insider-Resistant Group Key Exchange Protocol without Signatures.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HuangC09","doi":"10.1109/ICC.2009.5198734","ee":"https://doi.org/10.1109/ICC.2009.5198734","url":"https://dblp.org/rec/conf/icc/HuangC09"}, "url":"URL#5146605" }, { "@score":"1", "@id":"5146606", "info":{"authors":{"author":[{"@pid":"31/7003","text":"Nen-Fu Huang"},{"@pid":"97/3530","text":"Yen-Ming Chu"},{"@pid":"93/330","text":"Chi-Hung Tsai"},{"@pid":"97/7880","text":"Wei-Zen Huang"},{"@pid":"79/7881","text":"Wei-Jin Tzeng"}]},"title":"A Resource-Efficient Traffic Localization Scheme for Multiple BitTorrents.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HuangCTHT09","doi":"10.1109/ICC.2009.5198663","ee":"https://doi.org/10.1109/ICC.2009.5198663","url":"https://dblp.org/rec/conf/icc/HuangCTHT09"}, "url":"URL#5146606" }, { "@score":"1", "@id":"5146607", "info":{"authors":{"author":[{"@pid":"98/5766-8","text":"Xin Huang 0008"},{"@pid":"00/3860","text":"Sivakumar Ganapathy"},{"@pid":"10/5241","text":"Tilman Wolf"}]},"title":"Evaluating Algorithms for Composable Service Placement in Computer Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HuangGW09","doi":"10.1109/ICC.2009.5199007","ee":"https://doi.org/10.1109/ICC.2009.5199007","url":"https://dblp.org/rec/conf/icc/HuangGW09"}, "url":"URL#5146607" }, { "@score":"1", "@id":"5146608", "info":{"authors":{"author":[{"@pid":"30/4506","text":"Chung-Ming Huang"},{"@pid":"45/4007","text":"Chao-Hsien Lee"},{"@pid":"71/7381","text":"Po-Han Tseng"}]},"title":"Multihomed SIP-Based Network Mobility Using IEEE 802.21 Media Independent Handover.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/HuangLT09","doi":"10.1109/ICC.2009.5199199","ee":"https://doi.org/10.1109/ICC.2009.5199199","url":"https://dblp.org/rec/conf/icc/HuangLT09"}, "url":"URL#5146608" }, { "@score":"1", "@id":"5146609", "info":{"authors":{"author":[{"@pid":"66/4381","text":"Luigi Lo Iacono"},{"@pid":"12/1293","text":"Hariharan Rajasekaran"}]},"title":"Secure Browser-Based Access to Web Services.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/IaconoR09","doi":"10.1109/ICC.2009.5199439","ee":"https://doi.org/10.1109/ICC.2009.5199439","url":"https://dblp.org/rec/conf/icc/IaconoR09"}, "url":"URL#5146609" }, { "@score":"1", "@id":"5146610", "info":{"authors":{"author":[{"@pid":"23/83","text":"Ahmed S. Ibrahim 0001"},{"@pid":"68/3163","text":"K. J. Ray Liu"}]},"title":"Mitigating Channel Estimation Error via Cooperative Communications.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/IbrahimL09","doi":"10.1109/ICC.2009.5199186","ee":"https://doi.org/10.1109/ICC.2009.5199186","url":"https://dblp.org/rec/conf/icc/IbrahimL09"}, "url":"URL#5146610" }, { "@score":"1", "@id":"5146611", "info":{"authors":{"author":[{"@pid":"32/3695","text":"Salama Ikki"},{"@pid":"42/693","text":"Mohamed Hossam Ahmed"}]},"title":"On the Performance of Amplify-and-Forward Cooperative Diversity with the Nth Best-Relay Selection Scheme.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/IkkiA09","doi":"10.1109/ICC.2009.5199262","ee":"https://doi.org/10.1109/ICC.2009.5199262","url":"https://dblp.org/rec/conf/icc/IkkiA09"}, "url":"URL#5146611" }, { "@score":"1", "@id":"5146612", "info":{"authors":{"author":[{"@pid":"32/3695","text":"Salama Ikki"},{"@pid":"42/693","text":"Mohamed Hossam Ahmed"}]},"title":"Performance Analysis of Generalized Selection Combining for Amplify-and-Forward Cooperative-Diversity Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/IkkiA09a","doi":"10.1109/ICC.2009.5199309","ee":"https://doi.org/10.1109/ICC.2009.5199309","url":"https://dblp.org/rec/conf/icc/IkkiA09a"}, "url":"URL#5146612" }, { "@score":"1", "@id":"5146613", "info":{"authors":{"author":[{"@pid":"32/3695","text":"Salama Ikki"},{"@pid":"42/693","text":"Mohamed Hossam Ahmed"}]},"title":"Performance Analysis of Multi-Branch Decode-and-Forward Cooperative Diversity Networks over Nakagami-m Fading Channels.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/IkkiA09b","doi":"10.1109/ICC.2009.5199311","ee":"https://doi.org/10.1109/ICC.2009.5199311","url":"https://dblp.org/rec/conf/icc/IkkiA09b"}, "url":"URL#5146613" }, { "@score":"1", "@id":"5146614", "info":{"authors":{"author":[{"@pid":"16/1215","text":"Ömer Ileri"},{"@pid":"89/2790","text":"Jens Zander"}]},"title":"Broker Coordination in Demand Responsive Dynamic Spectrum Access Settings.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/IleriZ09","doi":"10.1109/ICC.2009.5198797","ee":"https://doi.org/10.1109/ICC.2009.5198797","url":"https://dblp.org/rec/conf/icc/IleriZ09"}, "url":"URL#5146614" }, { "@score":"1", "@id":"5146615", "info":{"authors":{"author":[{"@pid":"30/7883","text":"Rodrigue Imad"},{"@pid":"34/1442","text":"Sébastien Houcke"},{"@pid":"31/6022","text":"Christophe Jégo"}]},"title":"Blind Frame Synchronization of Product Codes Based on the Adaptation of the Parity Check Matrix.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ImadHJ09","doi":"10.1109/ICC.2009.5198792","ee":"https://doi.org/10.1109/ICC.2009.5198792","url":"https://dblp.org/rec/conf/icc/ImadHJ09"}, "url":"URL#5146615" }, { "@score":"1", "@id":"5146616", "info":{"authors":{"author":[{"@pid":"06/2673","text":"Susumu Ishihara"},{"@pid":"74/6935","text":"Tatsuya Suda"}]},"title":"Replica Arrangement Scheme for Location Dependent Information on Sensor Networks with Unpredictable Query Frequency.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/IshiharaS09","doi":"10.1109/ICC.2009.5199409","ee":"https://doi.org/10.1109/ICC.2009.5199409","url":"https://dblp.org/rec/conf/icc/IshiharaS09"}, "url":"URL#5146616" }, { "@score":"1", "@id":"5146617", "info":{"authors":{"author":[{"@pid":"33/2799","text":"Koji Ishii"},{"@pid":"57/6042","text":"Koji Ishibashi"},{"@pid":"02/1176","text":"Hideki Ochiai"}]},"title":"A Novel Cooperative Diversity Based on Multilevel Coded Modulation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/IshiiIO09","doi":"10.1109/ICC.2009.5198646","ee":"https://doi.org/10.1109/ICC.2009.5198646","url":"https://dblp.org/rec/conf/icc/IshiiIO09"}, "url":"URL#5146617" }, { "@score":"1", "@id":"5146618", "info":{"authors":{"author":[{"@pid":"57/6614","text":"Michel T. Ivrlac"},{"@pid":"70/6600","text":"Mario H. Castañeda"},{"@pid":"50/2506","text":"Josef A. Nossek"}]},"title":"On Opportunistic Beamforming in Fast Fading Scenarios.","venue":"ICC","pages":"1-4","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/IvrlacCN09","doi":"10.1109/ICC.2009.5199244","ee":"https://doi.org/10.1109/ICC.2009.5199244","url":"https://dblp.org/rec/conf/icc/IvrlacCN09"}, "url":"URL#5146618" }, { "@score":"1", "@id":"5146619", "info":{"authors":{"author":[{"@pid":"57/6614","text":"Michel T. Ivrlac"},{"@pid":"50/2506","text":"Josef A. Nossek"}]},"title":"Receive Antenna Gain of Uniform Linear Arrays of Isotrops.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/IvrlacN09","doi":"10.1109/ICC.2009.5199395","ee":"https://doi.org/10.1109/ICC.2009.5199395","url":"https://dblp.org/rec/conf/icc/IvrlacN09"}, "url":"URL#5146619" }, { "@score":"1", "@id":"5146620", "info":{"authors":{"author":[{"@pid":"67/4606","text":"Konrad Iwanicki"},{"@pid":"s/MaartenvanSteen","text":"Maarten van Steen"}]},"title":"Using Area Hierarchy for Multi-Resolution Storage and Search in Large Wireless Sensor Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/IwanickiS09","doi":"10.1109/ICC.2009.5199556","ee":"https://doi.org/10.1109/ICC.2009.5199556","url":"https://dblp.org/rec/conf/icc/IwanickiS09"}, "url":"URL#5146620" }, { "@score":"1", "@id":"5146621", "info":{"authors":{"author":[{"@pid":"38/3479","text":"Stephan Jaeckel"},{"@pid":"96/6510","text":"Lars Thiele"},{"@pid":"64/6614","text":"Armin Brylka"},{"@pid":"96/1994-5","text":"Lei Jiang 0005"},{"@pid":"77/5878","text":"Volker Jungnickel"},{"@pid":"53/6908","text":"Carsten Jandura"},{"@pid":"39/7883","text":"Joachim Heft"}]},"title":"Intercell Interference Measured in Urban Areas.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JaeckelTBJJJH09","doi":"10.1109/ICC.2009.5199088","ee":"https://doi.org/10.1109/ICC.2009.5199088","url":"https://dblp.org/rec/conf/icc/JaeckelTBJJJH09"}, "url":"URL#5146621" }, { "@score":"1", "@id":"5146622", "info":{"authors":{"author":[{"@pid":"27/5566","text":"Goce Jakimoski"},{"@pid":"s/KPSubbalakshmi","text":"K. P. Subbalakshmi"}]},"title":"Towards Secure Spectrum Decision.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JakimoskiS09","doi":"10.1109/ICC.2009.5199536","ee":"https://doi.org/10.1109/ICC.2009.5199536","url":"https://dblp.org/rec/conf/icc/JakimoskiS09"}, "url":"URL#5146622" }, { "@score":"1", "@id":"5146623", "info":{"authors":{"author":[{"@pid":"29/7884","text":"Kian Jalaleddini"},{"@pid":"02/7140","text":"Kaveh Moezzi"},{"@pid":"44/2770","text":"Amir G. Aghdam"},{"@pid":"54/3168","text":"Mehdi Alasti"},{"@pid":"15/2026","text":"Vahid Tarokh"}]},"title":"Controller Design for Rate Assignment in Wireless Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JalaleddiniMAAT09","doi":"10.1109/ICC.2009.5198854","ee":"https://doi.org/10.1109/ICC.2009.5198854","url":"https://dblp.org/rec/conf/icc/JalaleddiniMAAT09"}, "url":"URL#5146623" }, { "@score":"1", "@id":"5146624", "info":{"authors":{"author":[{"@pid":"96/2307","text":"Nasir Jamil"},{"@pid":"c/ThomasMChen","text":"Thomas M. Chen"}]},"title":"A Mathematical View of Network-Based Suppressions of Worm Epidemics.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JamilC09","doi":"10.1109/ICC.2009.5198629","ee":"https://doi.org/10.1109/ICC.2009.5198629","url":"https://dblp.org/rec/conf/icc/JamilC09"}, "url":"URL#5146624" }, { "@score":"1", "@id":"5146625", "info":{"authors":{"author":[{"@pid":"54/1064","text":"Hui Won Je"},{"@pid":"33/6749","text":"Dong Hyun Kim"},{"@pid":"03/3301","text":"Kwang Bok Lee"}]},"title":"Joint Precoding for MIMO-Relay Systems with Partial Channel State Information.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JeKL09","doi":"10.1109/ICC.2009.5199119","ee":"https://doi.org/10.1109/ICC.2009.5199119","url":"https://dblp.org/rec/conf/icc/JeKL09"}, "url":"URL#5146625" }, { "@score":"1", "@id":"5146626", "info":{"authors":{"author":[{"@pid":"44/3690","text":"Vitor Jesus"},{"@pid":"53/223","text":"Rui L. Aguiar"},{"@pid":"s/PeterSteenkiste","text":"Peter Steenkiste"}]},"title":"Supporting Dynamic Inter-Domain Network Composition: Domain Discovery.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JesusAS09","doi":"10.1109/ICC.2009.5199501","ee":"https://doi.org/10.1109/ICC.2009.5199501","url":"https://dblp.org/rec/conf/icc/JesusAS09"}, "url":"URL#5146626" }, { "@score":"1", "@id":"5146627", "info":{"authors":{"author":[{"@pid":"47/7884","text":"Guang Ji"},{"@pid":"86/2829","text":"Ben Liang 0001"},{"@pid":"22/6453","text":"Aladdin Saleh"}]},"title":"Buffer Schemes for VBR Video Streaming over Heterogeneous Wireless Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JiLS09","doi":"10.1109/ICC.2009.5198798","ee":"https://doi.org/10.1109/ICC.2009.5198798","url":"https://dblp.org/rec/conf/icc/JiLS09"}, "url":"URL#5146627" }, { "@score":"1", "@id":"5146628", "info":{"authors":{"author":[{"@pid":"92/4988","text":"Juncheng Jia"},{"@pid":"04/2024-1","text":"Qian Zhang 0001"}]},"title":"A Testbed Development Framework for Cognitive Radio Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JiaZ09","doi":"10.1109/ICC.2009.5198682","ee":"https://doi.org/10.1109/ICC.2009.5198682","url":"https://dblp.org/rec/conf/icc/JiaZ09"}, "url":"URL#5146628" }, { "@score":"1", "@id":"5146629", "info":{"authors":{"author":[{"@pid":"92/4988","text":"Juncheng Jia"},{"@pid":"43/6657-1","text":"Jin Zhang 0001"},{"@pid":"04/2024-1","text":"Qian Zhang 0001"}]},"title":"Relay-Assisted Routing in Cognitive Radio Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JiaZZ09","doi":"10.1109/ICC.2009.5199406","ee":"https://doi.org/10.1109/ICC.2009.5199406","url":"https://dblp.org/rec/conf/icc/JiaZZ09"}, "url":"URL#5146629" }, { "@score":"1", "@id":"5146630", "info":{"authors":{"author":[{"@pid":"18/4625-2","text":"Bin Jiang 0002"},{"@pid":"20/6898","text":"Feifei Gao"},{"@pid":"05/5369","text":"Xiqi Gao 0001"},{"@pid":"33/2397","text":"Arumugam Nallanathan"}]},"title":"Channel Estimation for Amplify-and-Forward Two-Way Relay Network with Power Allocation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JiangGGN09","doi":"10.1109/ICC.2009.5198819","ee":"https://doi.org/10.1109/ICC.2009.5198819","url":"https://dblp.org/rec/conf/icc/JiangGGN09"}, "url":"URL#5146630" }, { "@score":"1", "@id":"5146631", "info":{"authors":{"author":[{"@pid":"157/9651","text":"Zituo Jin"},{"@pid":"92/8355","text":"Santhanakrishnan Anand"},{"@pid":"s/KPSubbalakshmi","text":"K. P. Subbalakshmi"}]},"title":"Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JinAS09","doi":"10.1109/ICC.2009.5198911","ee":"https://doi.org/10.1109/ICC.2009.5198911","url":"https://dblp.org/rec/conf/icc/JinAS09"}, "url":"URL#5146631" }, { "@score":"1", "@id":"5146632", "info":{"authors":{"author":[{"@pid":"00/1728","text":"Xiaolong Jin"},{"@pid":"96/3727","text":"Geyong Min"},{"@pid":"64/1478","text":"Lan Wang"}]},"title":"A Comprehensive Analytical Model for Weighted Fair Queuing under Multi-Class Self-Similar Traffic.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JinMW09","doi":"10.1109/ICC.2009.5198583","ee":"https://doi.org/10.1109/ICC.2009.5198583","url":"https://dblp.org/rec/conf/icc/JinMW09"}, "url":"URL#5146632" }, { "@score":"1", "@id":"5146633", "info":{"authors":{"author":[{"@pid":"49/5340-2","text":"Shi Jin 0002"},{"@pid":"51/5954","text":"Matthew R. McKay"},{"@pid":"35/5506","text":"Kai-Kit Wong"},{"@pid":"66/2069-1","text":"Xiao Li 0001"}]},"title":"Low SNR Capacity of Double-Scattering MIMO Channels with Transmitter Channel Knowledge.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JinMWL09","doi":"10.1109/ICC.2009.5199157","ee":"https://doi.org/10.1109/ICC.2009.5199157","url":"https://dblp.org/rec/conf/icc/JinMWL09"}, "url":"URL#5146633" }, { "@score":"1", "@id":"5146634", "info":{"authors":{"author":[{"@pid":"68/3340","text":"Xin Jin"},{"@pid":"36/4327","text":"Yubo Yang"},{"@pid":"90/2236","text":"Lin Tian"},{"@pid":"70/287","text":"Di Pang"},{"@pid":"84/1530","text":"Jinglin Shi"},{"@pid":"71/2764","text":"Eryk Dutkiewicz"}]},"title":"QoS-Aware Optimal Power Allocation with Channel Inversion Regularization Precoding in MU-MIMO.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JinYTPSD09","doi":"10.1109/ICC.2009.5199380","ee":"https://doi.org/10.1109/ICC.2009.5199380","url":"https://dblp.org/rec/conf/icc/JinYTPSD09"}, "url":"URL#5146634" }, { "@score":"1", "@id":"5146635", "info":{"authors":{"author":[{"@pid":"28/279","text":"Nihar Jindal"},{"@pid":"84/4900","text":"Jeffrey G. Andrews"},{"@pid":"220/6991","text":"Steven Weber 0001"}]},"title":"Rethinking MIMO for Wireless Networks: Linear Throughput Increases with Multiple Receive Antennas.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JindalAW09","doi":"10.1109/ICC.2009.5199417","ee":"https://doi.org/10.1109/ICC.2009.5199417","url":"https://dblp.org/rec/conf/icc/JindalAW09"}, "url":"URL#5146635" }, { "@score":"1", "@id":"5146636", "info":{"authors":{"author":[{"@pid":"88/6142","text":"Yindi Jing"},{"@pid":"73/5832","text":"Hamid Jafarkhani"}]},"title":"Interference Cancellation in Distributed Space-Time Coded Wireless Relay Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JingJ09","doi":"10.1109/ICC.2009.5199092","ee":"https://doi.org/10.1109/ICC.2009.5199092","url":"https://dblp.org/rec/conf/icc/JingJ09"}, "url":"URL#5146636" }, { "@score":"1", "@id":"5146637", "info":{"authors":{"author":[{"@pid":"20/4825","text":"Eduard A. Jorswieck"},{"@pid":"39/3615","text":"Holger Boche"}]},"title":"Energy-Aware Utility Regions: Multiple Access Pareto Boundary.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JorswieckB09","doi":"10.1109/ICC.2009.5198996","ee":"https://doi.org/10.1109/ICC.2009.5198996","url":"https://dblp.org/rec/conf/icc/JorswieckB09"}, "url":"URL#5146637" }, { "@score":"1", "@id":"5146638", "info":{"authors":{"author":[{"@pid":"20/4825","text":"Eduard A. Jorswieck"},{"@pid":"64/6427","text":"Rami Mochaourab"},{"@pid":"45/2055","text":"Martin Mittelbach"}]},"title":"Effective Capacity Maximization in Multi-Antenna Channels with Covariance Feedback.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JorswieckMM09","doi":"10.1109/ICC.2009.5198963","ee":"https://doi.org/10.1109/ICC.2009.5198963","url":"https://dblp.org/rec/conf/icc/JorswieckMM09"}, "url":"URL#5146638" }, { "@score":"1", "@id":"5146639", "info":{"authors":{"author":[{"@pid":"89/5336","text":"Vinay Joseph"},{"@pid":"64/6125","text":"Vinod Sharma"},{"@pid":"99/1467","text":"Utpal Mukherji"}]},"title":"Optimal Sleep-Wake Policies for an Energy Harvesting Sensor Node.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JosephSM09","doi":"10.1109/ICC.2009.5199286","ee":"https://doi.org/10.1109/ICC.2009.5199286","url":"https://dblp.org/rec/conf/icc/JosephSM09"}, "url":"URL#5146639" }, { "@score":"1", "@id":"5146640", "info":{"authors":{"author":[{"@pid":"12/3725","text":"Byoung Hoon Jung"},{"@pid":"52/1125","text":"Seong Joon Kim"},{"@pid":"47/1138","text":"Hu Jin"},{"@pid":"85/4036-1","text":"Ho Young Hwang 0001"},{"@pid":"40/6750","text":"Jo Woon Chong"},{"@pid":"65/3004","text":"Dan Keun Sung"}]},"title":"Performance Improvement of Error-Prone Multi-Rate WLANS through Adjustment of Access/Frame Parameters.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/JungKJHCS09","doi":"10.1109/ICC.2009.5199328","ee":"https://doi.org/10.1109/ICC.2009.5199328","url":"https://dblp.org/rec/conf/icc/JungKJHCS09"}, "url":"URL#5146640" }, { "@score":"1", "@id":"5146641", "info":{"authors":{"author":[{"@pid":"70/4242","text":"Sachin Kadloor"},{"@pid":"22/3660","text":"Raviraj Adve"}]},"title":"Optimal Relay Assignment and Power Allocation in Selection Based Cooperative Cellular Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KadloorA09","doi":"10.1109/ICC.2009.5199285","ee":"https://doi.org/10.1109/ICC.2009.5199285","url":"https://dblp.org/rec/conf/icc/KadloorA09"}, "url":"URL#5146641" }, { "@score":"1", "@id":"5146642", "info":{"authors":{"author":[{"@pid":"76/1879","text":"Aravind Kailas"},{"@pid":"56/5264","text":"Mary Ann Ingram"}]},"title":"Investigating Multiple Alternating Cooperative Broadcasts to Enhance Network Longevity.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KailasI09","doi":"10.1109/ICC.2009.5199100","ee":"https://doi.org/10.1109/ICC.2009.5199100","url":"https://dblp.org/rec/conf/icc/KailasI09"}, "url":"URL#5146642" }, { "@score":"1", "@id":"5146643", "info":{"authors":{"author":[{"@pid":"61/2070","text":"Andrew J. Kalafut"},{"@pid":"59/2038","text":"Minaxi Gupta"}]},"title":"Pollution Resilience for DNS Resolvers.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KalafutG09","doi":"10.1109/ICC.2009.5199342","ee":"https://doi.org/10.1109/ICC.2009.5199342","url":"https://dblp.org/rec/conf/icc/KalafutG09"}, "url":"URL#5146643" }, { "@score":"1", "@id":"5146644", "info":{"authors":{"author":[{"@pid":"74/6121","text":"Sheetal Kalyani"},{"@pid":"70/6437","text":"Krishnamurthy Giridhar"}]},"title":"Low Complexity Decision Directed Channel Tracking for High Mobility OFDM Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KalyaniG09","doi":"10.1109/ICC.2009.5199151","ee":"https://doi.org/10.1109/ICC.2009.5199151","url":"https://dblp.org/rec/conf/icc/KalyaniG09"}, "url":"URL#5146644" }, { "@score":"1", "@id":"5146645", "info":{"authors":{"author":{"@pid":"12/4881","text":"Noriaki Kamiyama"}},"title":"Efficiently Constructing Candidate Set for Network Topology Design.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Kamiyama09","doi":"10.1109/ICC.2009.5198981","ee":"https://doi.org/10.1109/ICC.2009.5198981","url":"https://dblp.org/rec/conf/icc/Kamiyama09"}, "url":"URL#5146645" }, { "@score":"1", "@id":"5146646", "info":{"authors":{"author":[{"@pid":"52/6564","text":"Abla Kammoun"},{"@pid":"64/502","text":"Karim Abed-Meraim"},{"@pid":"85/3663","text":"Sofiène Affes"}]},"title":"An Efficient Regularized Semi-Blind Estimator.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KammounAA09","doi":"10.1109/ICC.2009.5198727","ee":"https://doi.org/10.1109/ICC.2009.5198727","url":"https://dblp.org/rec/conf/icc/KammounAA09"}, "url":"URL#5146646" }, { "@score":"1", "@id":"5146647", "info":{"authors":{"author":[{"@pid":"43/7883","text":"Ioannis Kanaras"},{"@pid":"08/6235","text":"Arsenia Chorti"},{"@pid":"21/6763","text":"Miguel R. D. Rodrigues"},{"@pid":"66/5161","text":"Izzat Darwazeh"}]},"title":"Spectrally Efficient FDM Signals: Bandwidth Gain at the Expense of Receiver Complexity.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KanarasCRD09","doi":"10.1109/ICC.2009.5199477","ee":"https://doi.org/10.1109/ICC.2009.5199477","url":"https://dblp.org/rec/conf/icc/KanarasCRD09"}, "url":"URL#5146647" }, { "@score":"1", "@id":"5146648", "info":{"authors":{"author":{"@pid":"85/7881","text":"Lei Kang"}},"title":"Protecting Location Privacy in Large-Scale Wireless Sensor Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Kang09","doi":"10.1109/ICC.2009.5199372","ee":"https://doi.org/10.1109/ICC.2009.5199372","url":"https://dblp.org/rec/conf/icc/Kang09"}, "url":"URL#5146648" }, { "@score":"1", "@id":"5146649", "info":{"authors":{"author":[{"@pid":"69/7881","text":"Jaewon Kang"},{"@pid":"65/6462","text":"John Sucec"},{"@pid":"76/1159","text":"Vikram Kaul"},{"@pid":"62/3185","text":"Sunil Samtani"},{"@pid":"13/2967","text":"Mariusz A. Fecko"}]},"title":"Robust PIM-SM Multicasting Using Anycast RP in Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KangSKSF09","doi":"10.1109/ICC.2009.5199425","ee":"https://doi.org/10.1109/ICC.2009.5199425","url":"https://dblp.org/rec/conf/icc/KangSKSF09"}, "url":"URL#5146649" }, { "@score":"1", "@id":"5146650", "info":{"authors":{"author":[{"@pid":"20/1696-1","text":"Xin Kang 0001"},{"@pid":"60/2536-6","text":"Rui Zhang 0006"},{"@pid":"98/153","text":"Ying-Chang Liang"},{"@pid":"09/336","text":"Hari Krishna Garg"}]},"title":"Optimal Power Allocation for Cognitive Radio Under Primary User's Outage Loss Constraint.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KangZLG09","doi":"10.1109/ICC.2009.5199283","ee":"https://doi.org/10.1109/ICC.2009.5199283","url":"https://dblp.org/rec/conf/icc/KangZLG09"}, "url":"URL#5146650" }, { "@score":"1", "@id":"5146651", "info":{"authors":{"author":{"@pid":"51/49","text":"Ebrahim Karami"}},"title":"Performance Analysis of the DD ML MIMO Channel Tracking Algorithm.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Karami09","doi":"10.1109/ICC.2009.5199315","ee":"https://doi.org/10.1109/ICC.2009.5199315","url":"https://dblp.org/rec/conf/icc/Karami09"}, "url":"URL#5146651" }, { "@score":"1", "@id":"5146652", "info":{"authors":{"author":[{"@pid":"136/8377","text":"Shirish Karande 0001"},{"@pid":"w/ZhengWang6","text":"Zheng Wang 0006"},{"@pid":"14/4619","text":"Hamid R. Sadjadpour"},{"@pid":"g/JJGarciaLunaAceves","text":"J. J. Garcia-Luna-Aceves"}]},"title":"Network Coding Does Not Change the Multicast throughput Order of Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KarandeWSG09","doi":"10.1109/ICC.2009.5199217","ee":"https://doi.org/10.1109/ICC.2009.5199217","url":"https://dblp.org/rec/conf/icc/KarandeWSG09"}, "url":"URL#5146652" }, { "@score":"1", "@id":"5146653", "info":{"authors":{"author":[{"@pid":"87/5526","text":"Eirini D. Karapistoli"},{"@pid":"47/3575","text":"Ioannis Gragopoulos"},{"@pid":"35/961","text":"Ioannis Tsetsinas"},{"@pid":"77/2216","text":"Fotini-Niovi Pavlidou"}]},"title":"A Directional MAC Protocol with Deafness Avoidance for UWB Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KarapistoliGTP09","doi":"10.1109/ICC.2009.5198593","ee":"https://doi.org/10.1109/ICC.2009.5198593","url":"https://dblp.org/rec/conf/icc/KarapistoliGTP09"}, "url":"URL#5146653" }, { "@score":"1", "@id":"5146654", "info":{"authors":{"author":[{"@pid":"34/6175","text":"Johan Karedal"},{"@pid":"06/5372","text":"Fredrik Tufvesson"},{"@pid":"63/2132","text":"Nicolai Czink"},{"@pid":"21/7881","text":"Alexander Paier"},{"@pid":"98/3857","text":"Charlotte Dumard"},{"@pid":"71/3289","text":"Thomas Zemen"},{"@pid":"44/1996","text":"Christoph F. Mecklenbräuker"},{"@pid":"54/2683","text":"Andreas F. Molisch"}]},"title":"Measurement-Based Modeling of Vehicle-to-Vehicle MIMO Channels.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KaredalTCPDZMM09","doi":"10.1109/ICC.2009.5199175","ee":"https://doi.org/10.1109/ICC.2009.5199175","url":"https://dblp.org/rec/conf/icc/KaredalTCPDZMM09"}, "url":"URL#5146654" }, { "@score":"1", "@id":"5146655", "info":{"authors":{"author":[{"@pid":"90/7882","text":"Eric Karmouch"},{"@pid":"00/6922","text":"Amiya Nayak"}]},"title":"A Distributed Protocol for Virtual Device Composition in Mobile Ad Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KarmouchN09","doi":"10.1109/ICC.2009.5198598","ee":"https://doi.org/10.1109/ICC.2009.5198598","url":"https://dblp.org/rec/conf/icc/KarmouchN09"}, "url":"URL#5146655" }, { "@score":"1", "@id":"5146656", "info":{"authors":{"author":{"@pid":"53/2236","text":"Stamatios V. Kartalopoulos"}},"title":"Security in Advanced Optical Communication Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Kartalopoulos09","doi":"10.1109/ICC.2009.5199444","ee":"https://doi.org/10.1109/ICC.2009.5199444","url":"https://dblp.org/rec/conf/icc/Kartalopoulos09"}, "url":"URL#5146656" }, { "@score":"1", "@id":"5146657", "info":{"authors":{"author":[{"@pid":"14/4817","text":"Elli Kartsakli"},{"@pid":"01/5283","text":"Nizar Zorba"},{"@pid":"24/1961-1","text":"Luis Alonso 0001"},{"@pid":"18/466","text":"Christos V. Verikoukis"}]},"title":"Multiuser MAC Protocols for 802.11n Wireless Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KartsakliZAV09","doi":"10.1109/ICC.2009.5199211","ee":"https://doi.org/10.1109/ICC.2009.5199211","url":"https://dblp.org/rec/conf/icc/KartsakliZAV09"}, "url":"URL#5146657" }, { "@score":"1", "@id":"5146658", "info":{"authors":{"author":[{"@pid":"34/4457","text":"Shuntaro Kashihara"},{"@pid":"95/4601","text":"Masanori Miyazawa"},{"@pid":"32/1792","text":"Kenichi Ogaki"},{"@pid":"37/5596","text":"Tomohiro Otani"}]},"title":"Proposal of the Architecture of a QoS Assured Network by Cooperating between IP Flow Control and MPLS DiffServ-TE.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KashiharaMOO09","doi":"10.1109/ICC.2009.5199371","ee":"https://doi.org/10.1109/ICC.2009.5199371","url":"https://dblp.org/rec/conf/icc/KashiharaMOO09"}, "url":"URL#5146658" }, { "@score":"1", "@id":"5146659", "info":{"authors":{"author":[{"@pid":"88/7881","text":"Alexandros Katsiotis"},{"@pid":"03/5928","text":"Panagiotis Rizomiliotis"},{"@pid":"98/2652","text":"Nicholas Kalouptsidis"}]},"title":"New Constructions of Low-Complexity Convolutional Codes.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KatsiotisRK09","doi":"10.1109/ICC.2009.5199221","ee":"https://doi.org/10.1109/ICC.2009.5199221","url":"https://dblp.org/rec/conf/icc/KatsiotisRK09"}, "url":"URL#5146659" }, { "@score":"1", "@id":"5146660", "info":{"authors":{"author":[{"@pid":"13/6662","text":"Ryoichi Kawahara"},{"@pid":"62/6630","text":"Tatsuya Mori"},{"@pid":"12/4881","text":"Noriaki Kamiyama"},{"@pid":"92/473","text":"Shigeaki Harada"},{"@pid":"80/6939","text":"Haruhisa Hasegawa"}]},"title":"Adaptive Bandwidth Control to Handle Long-Duration Large Flows.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KawaharaMKHH09","doi":"10.1109/ICC.2009.5198696","ee":"https://doi.org/10.1109/ICC.2009.5198696","url":"https://dblp.org/rec/conf/icc/KawaharaMKHH09"}, "url":"URL#5146660" }, { "@score":"1", "@id":"5146661", "info":{"authors":{"author":[{"@pid":"19/6234","text":"Jean-Marc Kelif"},{"@pid":"79/5633","text":"Marceau Coupechoux"}]},"title":"Impact of Topology and Shadowing on the Outage Probability of Cellular Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KelifC09","doi":"10.1109/ICC.2009.5199067","ee":"https://doi.org/10.1109/ICC.2009.5199067","url":"https://dblp.org/rec/conf/icc/KelifC09"}, "url":"URL#5146661" }, { "@score":"1", "@id":"5146662", "info":{"authors":{"author":[{"@pid":"58/1280","text":"Douglas J. Kelly"},{"@pid":"07/6093","text":"Richard A. Raines"},{"@pid":"92/4138","text":"Rusty O. Baldwin"},{"@pid":"56/5722","text":"Barry E. Mullins"},{"@pid":"g/MichaelRGrimaila","text":"Michael R. Grimaila"}]},"title":"Towards a Taxonomy of Wired and Wireless Anonymous Networks.","venue":"ICC","pages":"1-8","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KellyRBMG09","doi":"10.1109/ICC.2009.5199535","ee":"https://doi.org/10.1109/ICC.2009.5199535","url":"https://dblp.org/rec/conf/icc/KellyRBMG09"}, "url":"URL#5146662" }, { "@score":"1", "@id":"5146663", "info":{"authors":{"author":[{"@pid":"93/7479","text":"Alireza Kenarsari-Anhari"},{"@pid":"21/788","text":"Lutz H.-J. Lampe"}]},"title":"Performance Evaluation of QAM-Based BICM: An Analytical Approach.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Kenarsari-AnhariL09","doi":"10.1109/ICC.2009.5199326","ee":"https://doi.org/10.1109/ICC.2009.5199326","url":"https://dblp.org/rec/conf/icc/Kenarsari-AnhariL09"}, "url":"URL#5146663" }, { "@score":"1", "@id":"5146664", "info":{"authors":{"author":[{"@pid":"39/7882","text":"Mohamed S. Khairy"},{"@pid":"64/3421-1","text":"Mohamed M. Abdallah 0001"},{"@pid":"60/1448","text":"Serag E.-D. Habib"}]},"title":"Efficient FPGA Implementation of MIMO Decoder for Mobile WiMAX System.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KhairyAH09","doi":"10.1109/ICC.2009.5198971","ee":"https://doi.org/10.1109/ICC.2009.5198971","url":"https://dblp.org/rec/conf/icc/KhairyAH09"}, "url":"URL#5146664" }, { "@score":"1", "@id":"5146665", "info":{"authors":{"author":[{"@pid":"21/7647","text":"Asiya Khan"},{"@pid":"26/6732","text":"Lingfen Sun"},{"@pid":"15/5715","text":"Emmanuel C. Ifeachor"}]},"title":"Content Clustering Based Video Quality Prediction Model for MPEG4 Video Streaming over Wireless Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KhanSI09","doi":"10.1109/ICC.2009.5198850","ee":"https://doi.org/10.1109/ICC.2009.5198850","url":"https://dblp.org/rec/conf/icc/KhanSI09"}, "url":"URL#5146665" }, { "@score":"1", "@id":"5146666", "info":{"authors":{"author":[{"@pid":"78/113","text":"Rahul Khanna"},{"@pid":"69/1097","text":"Huaping Liu"},{"@pid":"41/2526","text":"Hsiao-Hwa Chen"}]},"title":"Reduced Complexity Intrusion Detection in Sensor Networks Using Genetic Algorithm.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KhannaLC09","doi":"10.1109/ICC.2009.5199399","ee":"https://doi.org/10.1109/ICC.2009.5199399","url":"https://dblp.org/rec/conf/icc/KhannaLC09"}, "url":"URL#5146666" }, { "@score":"1", "@id":"5146667", "info":{"authors":{"author":[{"@pid":"33/717","text":"Tamer Khattab"},{"@pid":"98/6377","text":"Maged Elkashlan"},{"@pid":"31/3227","text":"Hussein M. Alnuweiri"}]},"title":"Chip-Level Modulated BPPM Fiber-Optic Code Division Multiple Access.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KhattabEA09","doi":"10.1109/ICC.2009.5198825","ee":"https://doi.org/10.1109/ICC.2009.5198825","url":"https://dblp.org/rec/conf/icc/KhattabEA09"}, "url":"URL#5146667" }, { "@score":"1", "@id":"5146668", "info":{"authors":{"author":[{"@pid":"62/45","text":"Chadi Khirallah"},{"@pid":"80/4320-1","text":"Vladimir Stankovic 0001"},{"@pid":"83/4921","text":"Lina Stankovic"},{"@pid":"00/340","text":"Samuel Cheng 0001"}]},"title":"Stereo Image Transmission over Fading Channels with Multiterminal Source Coding.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KhirallahSSC09","doi":"10.1109/ICC.2009.5199492","ee":"https://doi.org/10.1109/ICC.2009.5199492","url":"https://dblp.org/rec/conf/icc/KhirallahSSC09"}, "url":"URL#5146668" }, { "@score":"1", "@id":"5146669", "info":{"authors":{"author":[{"@pid":"86/6868","text":"Amir Mahdi Khodaian"},{"@pid":"21/6529","text":"Babak Hossein Khalaj"},{"@pid":"23/5198","text":"Hamed Shah-Mansouri"}]},"title":"Optimal Utility-Energy Tradeoff in Delay Constrained Random Access Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KhodaianKS09","doi":"10.1109/ICC.2009.5199289","ee":"https://doi.org/10.1109/ICC.2009.5199289","url":"https://dblp.org/rec/conf/icc/KhodaianKS09"}, "url":"URL#5146669" }, { "@score":"1", "@id":"5146670", "info":{"authors":{"author":[{"@pid":"66/7737","text":"Wael Khreich"},{"@pid":"86/2306","text":"Eric Granger"},{"@pid":"99/2787","text":"Robert Sabourin"},{"@pid":"52/4812","text":"Ali Miri"}]},"title":"Combining Hidden Markov Models for Improved Anomaly Detection.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KhreichGSM09","doi":"10.1109/ICC.2009.5198832","ee":"https://doi.org/10.1109/ICC.2009.5198832","url":"https://dblp.org/rec/conf/icc/KhreichGSM09"}, "url":"URL#5146670" }, { "@score":"1", "@id":"5146671", "info":{"authors":{"author":[{"@pid":"73/4492","text":"Abdullatif S. Khrwat"},{"@pid":"05/5034","text":"Bayan S. Sharif"},{"@pid":"01/4379","text":"Charalampos Tsimenidis"},{"@pid":"b/SaidBoussakta","text":"Said Boussakta"}]},"title":"Precoded Spatial Multiplexing Systems in the Presence of Feedback Delay Using Kalman Filter.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KhrwatSTB09","doi":"10.1109/ICC.2009.5199358","ee":"https://doi.org/10.1109/ICC.2009.5199358","url":"https://dblp.org/rec/conf/icc/KhrwatSTB09"}, "url":"URL#5146671" }, { "@score":"1", "@id":"5146672", "info":{"authors":{"author":[{"@pid":"27/7814","text":"Andrey Khurri"},{"@pid":"54/7441","text":"Dmitriy Kuptsov"},{"@pid":"04/6586","text":"Andrei V. Gurtov"}]},"title":"Performance of Host Identity Protocol on Symbian OS.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KhurriKG09","doi":"10.1109/ICC.2009.5199332","ee":"https://doi.org/10.1109/ICC.2009.5199332","url":"https://dblp.org/rec/conf/icc/KhurriKG09"}, "url":"URL#5146672" }, { "@score":"1", "@id":"5146673", "info":{"authors":{"author":{"@pid":"30/2857","text":"Frank Kienle"}},"title":"On Low-Density MIMO Codes.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Kienle09","doi":"10.1109/ICC.2009.5199242","ee":"https://doi.org/10.1109/ICC.2009.5199242","url":"https://dblp.org/rec/conf/icc/Kienle09"}, "url":"URL#5146673" }, { "@score":"1", "@id":"5146674", "info":{"authors":{"author":[{"@pid":"59/7881","text":"Moritz Kiese"},{"@pid":"40/7882","text":"Elisabeth Georgieva"},{"@pid":"43/5035","text":"Dominic A. Schupke"},{"@pid":"86/3964","text":"Biswanath Mukherjee"},{"@pid":"e/JorgEberspacher","text":"Jörg Eberspächer"}]},"title":"Availability Evaluation of Hybrid Wireless Optical Broadband Access Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KieseGSME09","doi":"10.1109/ICC.2009.5198771","ee":"https://doi.org/10.1109/ICC.2009.5198771","url":"https://dblp.org/rec/conf/icc/KieseGSME09"}, "url":"URL#5146674" }, { "@score":"1", "@id":"5146675", "info":{"authors":{"author":[{"@pid":"92/2073","text":"Young Gil Kim"},{"@pid":"62/6601","text":"Norman C. Beaulieu"}]},"title":"A Greedy Cophasing Scheme for MIMO Beamforming Systems Using Quantized Feedback.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KimB09","doi":"10.1109/ICC.2009.5198613","ee":"https://doi.org/10.1109/ICC.2009.5198613","url":"https://dblp.org/rec/conf/icc/KimB09"}, "url":"URL#5146675" }, { "@score":"1", "@id":"5146676", "info":{"authors":{"author":[{"@pid":"42/3377","text":"Sunghun Kim 0002"},{"@pid":"89/5341","text":"Jongsub Cha"},{"@pid":"75/427","text":"Joongsoo Ma"}]},"title":"Interference-Aware Channel Assignments with Seamless Multi-Channel Monitoring in Wireless Mesh Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KimCM09","doi":"10.1109/ICC.2009.5199095","ee":"https://doi.org/10.1109/ICC.2009.5199095","url":"https://dblp.org/rec/conf/icc/KimCM09"}, "url":"URL#5146676" }, { "@score":"1", "@id":"5146677", "info":{"authors":{"author":[{"@pid":"96/6156","text":"Jin Woo Kim"},{"@pid":"96/6745","text":"Chung Gu Kang 0001"},{"@pid":"19/3031","text":"Byung-Jae Kwak"},{"@pid":"69/261","text":"Dong Seung Kwon"}]},"title":"Design of a Codebook Structure for a Progressively Linear Pre-Coded Closed-Loop MIMO Hybrid ARQ System.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KimKKK09","doi":"10.1109/ICC.2009.5198901","ee":"https://doi.org/10.1109/ICC.2009.5198901","url":"https://dblp.org/rec/conf/icc/KimKKK09"}, "url":"URL#5146677" }, { "@score":"1", "@id":"5146678", "info":{"authors":{"author":[{"@pid":"20/2447","text":"Daewon Kim"},{"@pid":"23/6710","text":"Ikkyun Kim"},{"@pid":"44/3409","text":"Jintae Oh"},{"@pid":"21/7884","text":"Hyunsook Cho"}]},"title":"Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KimKOC09","doi":"10.1109/ICC.2009.5199134","ee":"https://doi.org/10.1109/ICC.2009.5199134","url":"https://dblp.org/rec/conf/icc/KimKOC09"}, "url":"URL#5146678" }, { "@score":"1", "@id":"5146679", "info":{"authors":{"author":[{"@pid":"37/3582","text":"Jongtack Kim"},{"@pid":"14/1589","text":"Yugyung Lee"},{"@pid":"72/5261","text":"Saewoong Bahk"}]},"title":"SALSA: Super-Peer Assisted Live Streaming Architecture.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KimLB09","doi":"10.1109/ICC.2009.5199431","ee":"https://doi.org/10.1109/ICC.2009.5199431","url":"https://dblp.org/rec/conf/icc/KimLB09"}, "url":"URL#5146679" }, { "@score":"1", "@id":"5146680", "info":{"authors":{"author":[{"@pid":"74/3423","text":"Jin-Sung Kim"},{"@pid":"03/1530","text":"Sung Hyun Moon"},{"@pid":"20/6158","text":"Inkyu Lee"}]},"title":"A New Reduced Complexity ML Detection Scheme for MIMO Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KimML09","doi":"10.1109/ICC.2009.5198645","ee":"https://doi.org/10.1109/ICC.2009.5198645","url":"https://dblp.org/rec/conf/icc/KimML09"}, "url":"URL#5146680" }, { "@score":"1", "@id":"5146681", "info":{"authors":{"author":{"@pid":"15/698","text":"Tadahiko Kimoto"}},"title":"An Advanced Method for Watermarking Digital Signals in Bit-Plane Structure.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Kimoto09","doi":"10.1109/ICC.2009.5198717","ee":"https://doi.org/10.1109/ICC.2009.5198717","url":"https://dblp.org/rec/conf/icc/Kimoto09"}, "url":"URL#5146681" }, { "@score":"1", "@id":"5146682", "info":{"authors":{"author":[{"@pid":"68/5843-2","text":"Csaba Király 0002"},{"@pid":"53/2961","text":"Renato Lo Cigno"}]},"title":"IPsec-Based Anonymous Networking: A Working Implementation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KiralyC09","doi":"10.1109/ICC.2009.5199102","ee":"https://doi.org/10.1109/ICC.2009.5199102","url":"https://dblp.org/rec/conf/icc/KiralyC09"}, "url":"URL#5146682" }, { "@score":"1", "@id":"5146683", "info":{"authors":{"author":[{"@pid":"47/9673","text":"Y. V. Kiran"},{"@pid":"14/3381","text":"T. Venkatesh"},{"@pid":"78/4000","text":"C. Siva Ram Murthy"}]},"title":"A Multi-Agent Reinforcement Learning Approach to Path Selection in Optical Burst Switching Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KiranVM09","doi":"10.1109/ICC.2009.5198632","ee":"https://doi.org/10.1109/ICC.2009.5198632","url":"https://dblp.org/rec/conf/icc/KiranVM09"}, "url":"URL#5146683" }, { "@score":"1", "@id":"5146684", "info":{"authors":{"author":[{"@pid":"k/HiroyukiKitagawa","text":"Hiroyuki Kitagawa"},{"@pid":"45/3969","text":"Makoto Tanahashi"},{"@pid":"02/1176","text":"Hideki Ochiai"}]},"title":"FPGA Implementation of Trellis Shaping to Control Peak Power for PSK Signals.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KitagawaTO09","doi":"10.1109/ICC.2009.5199039","ee":"https://doi.org/10.1109/ICC.2009.5199039","url":"https://dblp.org/rec/conf/icc/KitagawaTO09"}, "url":"URL#5146684" }, { "@score":"1", "@id":"5146685", "info":{"authors":{"author":[{"@pid":"85/4976","text":"Negar Kiyavash"},{"@pid":"39/6580","text":"Todd P. Coleman"},{"@pid":"42/7883","text":"Mavis Rodrigues"}]},"title":"Novel Shaping and Complexity-Reduction Techniques for Approaching Capacity over Queuing Timing Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KiyavashCR09","doi":"10.1109/ICC.2009.5199227","ee":"https://doi.org/10.1109/ICC.2009.5199227","url":"https://dblp.org/rec/conf/icc/KiyavashCR09"}, "url":"URL#5146685" }, { "@score":"1", "@id":"5146686", "info":{"authors":{"author":[{"@pid":"03/7882","text":"Randall W. Klein"},{"@pid":"14/4566","text":"Michael A. Temple"},{"@pid":"93/1861","text":"Michael J. Mendenhall"},{"@pid":"05/7881","text":"Donald R. Reising"}]},"title":"Sensitivity Analysis of Burst Detection and RF Fingerprinting Classification Performance.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KleinTMR09","doi":"10.1109/ICC.2009.5199451","ee":"https://doi.org/10.1109/ICC.2009.5199451","url":"https://dblp.org/rec/conf/icc/KleinTMR09"}, "url":"URL#5146686" }, { "@score":"1", "@id":"5146687", "info":{"authors":{"author":[{"@pid":"54/5802","text":"Dzmitry Kliazovich"},{"@pid":"26/7299","text":"Nadhir Ben Halima"},{"@pid":"39/4893","text":"Fabrizio Granelli"}]},"title":"Context-Aware Receiver-Driven Retransmission Control in Wireless Local Area Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KliazovichHG09","doi":"10.1109/ICC.2009.5198852","ee":"https://doi.org/10.1109/ICC.2009.5198852","url":"https://dblp.org/rec/conf/icc/KliazovichHG09"}, "url":"URL#5146687" }, { "@score":"1", "@id":"5146688", "info":{"authors":{"author":[{"@pid":"77/5010","text":"You-Chang Ko"},{"@pid":"57/3191-1","text":"Sumit Roy 0001"},{"@pid":"37/6676","text":"Choong-Ho Cho"},{"@pid":"64/5722","text":"Hyong-Woo Lee"}]},"title":"An Enhanced Multiple-Feedback Algorithm for RFID MAC Protocols.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KoRCL09","doi":"10.1109/ICC.2009.5198731","ee":"https://doi.org/10.1109/ICC.2009.5198731","url":"https://dblp.org/rec/conf/icc/KoRCL09"}, "url":"URL#5146688" }, { "@score":"1", "@id":"5146689", "info":{"authors":{"author":[{"@pid":"23/3236","text":"Youngwook Ko"},{"@pid":"74/6270","text":"Sergiy A. Vorobyov"},{"@pid":"84/2499","text":"Masoud Ardakani"}]},"title":"How Much Multiuser Diversity Gain is Required over Large-Scale Fading?","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KoVA09","doi":"10.1109/ICC.2009.5199056","ee":"https://doi.org/10.1109/ICC.2009.5199056","url":"https://dblp.org/rec/conf/icc/KoVA09"}, "url":"URL#5146689" }, { "@score":"1", "@id":"5146690", "info":{"authors":{"author":[{"@pid":"98/3964","text":"Toshiaki Koike-Akino"},{"@pid":"50/3930","text":"Petar Popovski"},{"@pid":"15/2026","text":"Vahid Tarokh"}]},"title":"Denoising Strategy for Convolutionally-Coded Bidirectional Relaying.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Koike-AkinoPT09","doi":"10.1109/ICC.2009.5198893","ee":"https://doi.org/10.1109/ICC.2009.5198893","url":"https://dblp.org/rec/conf/icc/Koike-AkinoPT09"}, "url":"URL#5146690" }, { "@score":"1", "@id":"5146691", "info":{"authors":{"author":[{"@pid":"98/3964","text":"Toshiaki Koike-Akino"},{"@pid":"15/2026","text":"Vahid Tarokh"}]},"title":"Sphere Packing Optimization and EXIT Chart Analysis for Multi-Dimensional QAM Signaling.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Koike-AkinoT09","doi":"10.1109/ICC.2009.5199484","ee":"https://doi.org/10.1109/ICC.2009.5199484","url":"https://dblp.org/rec/conf/icc/Koike-AkinoT09"}, "url":"URL#5146691" }, { "@score":"1", "@id":"5146692", "info":{"authors":{"author":[{"@pid":"16/2621","text":"Vinay Kolar"},{"@pid":"86/2654","text":"Nael B. Abu-Ghazaleh"},{"@pid":"m/PetriMahonen","text":"Petri Mähönen"}]},"title":"Decomposition for Low-Complexity Near-Optimal Routing in Multi-Hop Wireless Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KolarAM09","doi":"10.1109/ICC.2009.5198885","ee":"https://doi.org/10.1109/ICC.2009.5198885","url":"https://dblp.org/rec/conf/icc/KolarAM09"}, "url":"URL#5146692" }, { "@score":"1", "@id":"5146693", "info":{"authors":{"author":[{"@pid":"07/1716","text":"Mario Kolberg"},{"@pid":"b/JohnFBuford","text":"John F. Buford"},{"@pid":"74/1788","text":"Krishna Kishore Dhara"},{"@pid":"28/4394","text":"Xiaotao Wu"},{"@pid":"22/3250","text":"Venkatesh Krishnaswamy"}]},"title":"Managing Distributed Feature Interactions in Enterprise SIP Application Servers.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KolbergBDWK09","doi":"10.1109/ICC.2009.5199162","ee":"https://doi.org/10.1109/ICC.2009.5199162","url":"https://dblp.org/rec/conf/icc/KolbergBDWK09"}, "url":"URL#5146693" }, { "@score":"1", "@id":"5146694", "info":{"authors":{"author":[{"@pid":"01/6041","text":"Ramakant S. Komali"},{"@pid":"87/2959","text":"Allen B. MacKenzie"}]},"title":"Analyzing Selfish Topology Control in Multi-Radio Multi-Channel Multi-Hop Wireless Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KomaliM09","doi":"10.1109/ICC.2009.5198750","ee":"https://doi.org/10.1109/ICC.2009.5198750","url":"https://dblp.org/rec/conf/icc/KomaliM09"}, "url":"URL#5146694" }, { "@score":"1", "@id":"5146695", "info":{"authors":{"author":{"@pid":"07/4165","text":"Ning Kong"}},"title":"Performance Comparison Among Conventional Selection Combining, Optimum Selection Combining and Maximal Ratio Combining.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Kong09","doi":"10.1109/ICC.2009.5199319","ee":"https://doi.org/10.1109/ICC.2009.5199319","url":"https://dblp.org/rec/conf/icc/Kong09"}, "url":"URL#5146695" }, { "@score":"1", "@id":"5146696", "info":{"authors":{"author":[{"@pid":"96/2850","text":"Zhen Kong"},{"@pid":"t/BrunoTuffin","text":"Bruno Tuffin"},{"@pid":"79/1432","text":"Yu-Kwong Kwok"},{"@pid":"80/3885","text":"Jiangzhou Wang"}]},"title":"Analysis of Duopoly Price Competition Between WLAN Providers.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KongTKW09","doi":"10.1109/ICC.2009.5198744","ee":"https://doi.org/10.1109/ICC.2009.5198744","url":"https://dblp.org/rec/conf/icc/KongTKW09"}, "url":"URL#5146696" }, { "@score":"1", "@id":"5146697", "info":{"authors":{"author":[{"@pid":"66/7420","text":"André König"},{"@pid":"95/1816","text":"Matthias Hollick"},{"@pid":"s/RalfSteinmetz","text":"Ralf Steinmetz"}]},"title":"A Stochastic Analysis of Secure Joint Decision Processes in Peer-to-Peer Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KonigHS09","doi":"10.1109/ICC.2009.5198674","ee":"https://doi.org/10.1109/ICC.2009.5198674","url":"https://dblp.org/rec/conf/icc/KonigHS09"}, "url":"URL#5146697" }, { "@score":"1", "@id":"5146698", "info":{"authors":{"author":[{"@pid":"k/AndreasKonstantinidis2","text":"Andreas Konstantinidis 0002"},{"@pid":"63/1587-1","text":"Kun Yang 0001"},{"@pid":"98/1240","text":"Qingfu Zhang 0001"}]},"title":"Problem-Specific Encoding and Genetic Operation for a Multi-Objective Deployment and Power Assignment Problem in Wireless Sensor Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KonstantinidisYZ09","doi":"10.1109/ICC.2009.5199369","ee":"https://doi.org/10.1109/ICC.2009.5199369","url":"https://dblp.org/rec/conf/icc/KonstantinidisYZ09"}, "url":"URL#5146698" }, { "@score":"1", "@id":"5146699", "info":{"authors":{"author":[{"@pid":"12/852","text":"Ömer Korçak"},{"@pid":"47/3101","text":"Fatih Alagöz"}]},"title":"Link-Layer Handover in Earth-Fixed LEO Satellite Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KorcakA09","doi":"10.1109/ICC.2009.5199139","ee":"https://doi.org/10.1109/ICC.2009.5199139","url":"https://dblp.org/rec/conf/icc/KorcakA09"}, "url":"URL#5146699" }, { "@score":"1", "@id":"5146700", "info":{"authors":{"author":[{"@pid":"54/5397","text":"Victoria Kostina"},{"@pid":"90/427","text":"Sergey Loyka"}]},"title":"Optimum Power and Rate Allocation for Coded V-BLAST.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KostinaL09","doi":"10.1109/ICC.2009.5199297","ee":"https://doi.org/10.1109/ICC.2009.5199297","url":"https://dblp.org/rec/conf/icc/KostinaL09"}, "url":"URL#5146700" }, { "@score":"1", "@id":"5146701", "info":{"authors":{"author":[{"@pid":"297/3263-1","text":"Michael Krause 0001"},{"@pid":"57/6672","text":"Desmond P. Taylor"},{"@pid":"69/2212","text":"Philippa A. Martin"}]},"title":"An Iterative List-Based Multiuser Detector for Overloaded Receivers in a Rayleigh Fading Channel.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KrauseTM09","doi":"10.1109/ICC.2009.5198736","ee":"https://doi.org/10.1109/ICC.2009.5198736","url":"https://dblp.org/rec/conf/icc/KrauseTM09"}, "url":"URL#5146701" }, { "@score":"1", "@id":"5146702", "info":{"authors":{"author":[{"@pid":"89/7881","text":"Vinod Kristem"},{"@pid":"59/3422","text":"Neelesh B. Mehta"},{"@pid":"54/2683","text":"Andreas F. Molisch"}]},"title":"Optimal Weighted Antenna Selection for Imperfect Channel Knowledge from Training.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KristemMM09","doi":"10.1109/ICC.2009.5199290","ee":"https://doi.org/10.1109/ICC.2009.5199290","url":"https://dblp.org/rec/conf/icc/KristemMM09"}, "url":"URL#5146702" }, { "@score":"1", "@id":"5146703", "info":{"authors":{"author":[{"@pid":"86/2936","text":"Marco Krondorf"},{"@pid":"f/GFettweis","text":"Gerhard P. Fettweis"}]},"title":"Carrier Frequency Dependent Downlink Spectral Efficiency of Cellular LTE Deployments.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KrondorfF09","doi":"10.1109/ICC.2009.5198811","ee":"https://doi.org/10.1109/ICC.2009.5198811","url":"https://dblp.org/rec/conf/icc/KrondorfF09"}, "url":"URL#5146703" }, { "@score":"1", "@id":"5146704", "info":{"authors":{"author":[{"@pid":"15/2227","text":"Ayumu Kubota"},{"@pid":"22/993","text":"Yutaka Miyake"}]},"title":"Public Key-Based Rendezvous Infrastructure for Secure and Flexible Private Networking.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KubotaM09","doi":"10.1109/ICC.2009.5199375","ee":"https://doi.org/10.1109/ICC.2009.5199375","url":"https://dblp.org/rec/conf/icc/KubotaM09"}, "url":"URL#5146704" }, { "@score":"1", "@id":"5146705", "info":{"authors":{"author":[{"@pid":"88/7532","text":"Kiran Kuchi"},{"@pid":"21/7882","text":"Vinod Ramaswamy"},{"@pid":"44/8356","text":"Dileep Manisseri Kalathil"},{"@pid":"44/7882","text":"Padmanabhan Madampu Suryasarman"},{"@pid":"67/7883","text":"Baskaran Dhivagar"},{"@pid":"05/49","text":"Deviraj Klutto Milleth Jeniston"},{"@pid":"32/1856","text":"Bhaskar Ramamurthi"},{"@pid":"70/6437","text":"Krishnamurthy Giridhar"}]},"title":"Interference Mitigation Using Conjugate Data Repetition.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KuchiRKSDJRG09","doi":"10.1109/ICC.2009.5199093","ee":"https://doi.org/10.1109/ICC.2009.5199093","url":"https://dblp.org/rec/conf/icc/KuchiRKSDJRG09"}, "url":"URL#5146705" }, { "@score":"1", "@id":"5146706", "info":{"authors":{"author":[{"@pid":"69/3769-1","text":"Volker Kühn 0001"},{"@pid":"92/7883","text":"Sebastian Vorköper"}]},"title":"Information Combining for Relay Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KuhnV09","doi":"10.1109/ICC.2009.5199081","ee":"https://doi.org/10.1109/ICC.2009.5199081","url":"https://dblp.org/rec/conf/icc/KuhnV09"}, "url":"URL#5146706" }, { "@score":"1", "@id":"5146707", "info":{"authors":{"author":[{"@pid":"27/10720","text":"Ajay Kulkarni"},{"@pid":"29/50-1","text":"Ren Wang 0001"},{"@pid":"83/3053","text":"Christian Maciocco"},{"@pid":"75/1299","text":"Sanjay Bakshi"},{"@pid":"55/7883","text":"James Tsai"}]},"title":"IDC: An Energy Efficient Communication Scheme for Connected Mobile Platforms.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KulkarniWMBT09","doi":"10.1109/ICC.2009.5199061","ee":"https://doi.org/10.1109/ICC.2009.5199061","url":"https://dblp.org/rec/conf/icc/KulkarniWMBT09"}, "url":"URL#5146707" }, { "@score":"1", "@id":"5146708", "info":{"authors":{"author":{"@pid":"77/116","text":"Wen-Hsing Kuo"}},"title":"Recipient Maximization Routing Scheme for Multicast over IEEE 802.16j Relay Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Kuo09","doi":"10.1109/ICC.2009.5199396","ee":"https://doi.org/10.1109/ICC.2009.5199396","url":"https://dblp.org/rec/conf/icc/Kuo09"}, "url":"URL#5146708" }, { "@score":"1", "@id":"5146709", "info":{"authors":{"author":[{"@pid":"37/7882","text":"Kuan-Lin Kuo"},{"@pid":"67/258","text":"Hung-Yun Hsieh"},{"@pid":"70/2590","text":"Ping-Cheng Yeh"}]},"title":"A Study on Collaborative Beamforming with Protocol Defects in Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KuoHY09","doi":"10.1109/ICC.2009.5198678","ee":"https://doi.org/10.1109/ICC.2009.5198678","url":"https://dblp.org/rec/conf/icc/KuoHY09"}, "url":"URL#5146709" }, { "@score":"1", "@id":"5146710", "info":{"authors":{"author":[{"@pid":"23/1245","text":"Ernest Kurniawan"},{"@pid":"66/549","text":"A. S. Madhukumar"},{"@pid":"c/FrancoisPSChin","text":"Francois P. S. Chin"}]},"title":"Low Complexity Antenna Selection Scheme for Multiuser MIMO Broadcast Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KurniawanMC09","doi":"10.1109/ICC.2009.5199149","ee":"https://doi.org/10.1109/ICC.2009.5199149","url":"https://dblp.org/rec/conf/icc/KurniawanMC09"}, "url":"URL#5146710" }, { "@score":"1", "@id":"5146711", "info":{"authors":{"author":[{"@pid":"89/2419","text":"Tolga Kurt"},{"@pid":"39/3095","text":"Günes Karabulut-Kurt"},{"@pid":"14/258","text":"Abbas Yongaçoglu"}]},"title":"Throughput Enhancement in Multi-Carrier Systems Employing Overlapping Weyl-Heisenberg Frames.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KurtKY09","doi":"10.1109/ICC.2009.5199525","ee":"https://doi.org/10.1109/ICC.2009.5199525","url":"https://dblp.org/rec/conf/icc/KurtKY09"}, "url":"URL#5146711" }, { "@score":"1", "@id":"5146712", "info":{"authors":{"author":[{"@pid":"24/4413","text":"Mathias Kurth"},{"@pid":"67/3288","text":"Ulf Hermann"},{"@pid":"11/750","text":"Anatolij Zubow"},{"@pid":"89/3181","text":"Jens-Peter Redlich"}]},"title":"Network Coding for Bit Error Recovery in IEEE 802.11 Mesh Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KurthHZR09","doi":"10.1109/ICC.2009.5199218","ee":"https://doi.org/10.1109/ICC.2009.5199218","url":"https://dblp.org/rec/conf/icc/KurthHZR09"}, "url":"URL#5146712" }, { "@score":"1", "@id":"5146713", "info":{"authors":{"author":[{"@pid":"68/3974","text":"Alexandr M. Kuzminskiy"},{"@pid":"06/2870","text":"Yuri I. Abramovich"}]},"title":"Adaptive Antenna Array Interference Mitigation Diversity for Decentralized Dynamic Spectrum Allocation in License-Exempt Spectrum.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KuzminskiyA09","doi":"10.1109/ICC.2009.5198695","ee":"https://doi.org/10.1109/ICC.2009.5198695","url":"https://dblp.org/rec/conf/icc/KuzminskiyA09"}, "url":"URL#5146713" }, { "@score":"1", "@id":"5146714", "info":{"authors":{"author":[{"@pid":"28/1225","text":"Ryoulhee Kwak"},{"@pid":"40/1964","text":"John M. Cioffi"}]},"title":"Fundamental Power-Allocation for Cooperative Relay Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KwakC09","doi":"10.1109/ICC.2009.5305939","ee":"https://doi.org/10.1109/ICC.2009.5305939","url":"https://dblp.org/rec/conf/icc/KwakC09"}, "url":"URL#5146714" }, { "@score":"1", "@id":"5146715", "info":{"authors":{"author":[{"@pid":"78/5883","text":"Raymond Kwan"},{"@pid":"76/3131","text":"Cyril Leung"},{"@pid":"84/6889-3","text":"Jie Zhang 0003"}]},"title":"Resource Allocation in an LTE Cellular Communication System.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/KwanLZ09","doi":"10.1109/ICC.2009.5199412","ee":"https://doi.org/10.1109/ICC.2009.5199412","url":"https://dblp.org/rec/conf/icc/KwanLZ09"}, "url":"URL#5146715" }, { "@score":"1", "@id":"5146716", "info":{"authors":{"author":[{"@pid":"53/7882","text":"Vaidhehi Lakshmiraman"},{"@pid":"65/5635","text":"Byrav Ramamurthy"}]},"title":"Joint Computing and Network Resource Scheduling in a Lambda Grid Network.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LakshmiramanR09","doi":"10.1109/ICC.2009.5199110","ee":"https://doi.org/10.1109/ICC.2009.5199110","url":"https://dblp.org/rec/conf/icc/LakshmiramanR09"}, "url":"URL#5146716" }, { "@score":"1", "@id":"5146717", "info":{"authors":{"author":[{"@pid":"31/7882","text":"Leonardo Lanante"},{"@pid":"69/1327","text":"Masayuki Kurosaki"},{"@pid":"24/4240","text":"Hiroshi Ochi"}]},"title":"A New Joint Estimation Scheme for Carrier Frequency Offset and I/Q Imbalance.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LananteKO09","doi":"10.1109/ICC.2009.5198640","ee":"https://doi.org/10.1109/ICC.2009.5198640","url":"https://dblp.org/rec/conf/icc/LananteKO09"}, "url":"URL#5146717" }, { "@score":"1", "@id":"5146718", "info":{"authors":{"author":[{"@pid":"28/1139","text":"Yidong Lang"},{"@pid":"45/3551","text":"Dirk Wübben"},{"@pid":"07/871","text":"Karl-Dirk Kammeyer"}]},"title":"Power Allocations for Adaptive Distributed MIMO Multi-Hop Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LangWK09","doi":"10.1109/ICC.2009.5199351","ee":"https://doi.org/10.1109/ICC.2009.5199351","url":"https://dblp.org/rec/conf/icc/LangWK09"}, "url":"URL#5146718" }, { "@score":"1", "@id":"5146719", "info":{"authors":{"author":[{"@pid":"89/5200","text":"Steven Lanzisera"},{"@pid":"83/2900","text":"Ankur Mehta"},{"@pid":"50/6450","text":"Kristofer S. J. Pister"}]},"title":"Reducing Average Power in Wireless Sensor Networks through Data Rate Adaptation.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LanziseraMP09","doi":"10.1109/ICC.2009.5199403","ee":"https://doi.org/10.1109/ICC.2009.5199403","url":"https://dblp.org/rec/conf/icc/LanziseraMP09"}, "url":"URL#5146719" }, { "@score":"1", "@id":"5146720", "info":{"authors":{"author":[{"@pid":"50/6030","text":"Federico Larroca"},{"@pid":"61/1558","text":"Jean-Louis Rougier"}]},"title":"Routing Games for Traffic Engineering.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LarrocaR09","doi":"10.1109/ICC.2009.5199427","ee":"https://doi.org/10.1109/ICC.2009.5199427","url":"https://dblp.org/rec/conf/icc/LarrocaR09"}, "url":"URL#5146720" }, { "@score":"1", "@id":"5146721", "info":{"authors":{"author":[{"@pid":"10/7255","text":"Mohamed Abdel Latif"},{"@pid":"164/8759","text":"Ahmed K. Sultan"},{"@pid":"89/614","text":"Hesham El Gamal"}]},"title":"ARQ-Based Secret Key Sharing.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LatifSG09","doi":"10.1109/ICC.2009.5198764","ee":"https://doi.org/10.1109/ICC.2009.5198764","url":"https://dblp.org/rec/conf/icc/LatifSG09"}, "url":"URL#5146721" }, { "@score":"1", "@id":"5146722", "info":{"authors":{"author":[{"@pid":"89/5011","text":"Yong-Jin Lee"},{"@pid":"a/MAtiquzzaman","text":"Mohammed Atiquzzaman"}]},"title":"Mean Waiting Delay for Web Object Transfer in Wireless SCTP Environment.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LeeA09","doi":"10.1109/ICC.2009.5199174","ee":"https://doi.org/10.1109/ICC.2009.5199174","url":"https://dblp.org/rec/conf/icc/LeeA09"}, "url":"URL#5146722" }, { "@score":"1", "@id":"5146723", "info":{"authors":{"author":[{"@pid":"38/7864","text":"Si-Hyeon Lee"},{"@pid":"10/3722","text":"Sae-Young Chung"}]},"title":"Degrees of Freedom of Cooperative MIMO in Cellular Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LeeC09","doi":"10.1109/ICC.2009.5198888","ee":"https://doi.org/10.1109/ICC.2009.5198888","url":"https://dblp.org/rec/conf/icc/LeeC09"}, "url":"URL#5146723" }, { "@score":"1", "@id":"5146724", "info":{"authors":{"author":[{"@pid":"l/JongHyoukLee","text":"Jong-Hyouk Lee"},{"@pid":"50/4458","text":"Sri Gundavelli"},{"@pid":"c/TMChung","text":"Tai-Myoung Chung"}]},"title":"A Performance Analysis on Route Optimization for Proxy Mobile IPv6.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LeeGC09","doi":"10.1109/ICC.2009.5198656","ee":"https://doi.org/10.1109/ICC.2009.5198656","url":"https://dblp.org/rec/conf/icc/LeeGC09"}, "url":"URL#5146724" }, { "@score":"1", "@id":"5146725", "info":{"authors":{"author":[{"@pid":"72/5210","text":"Kyungchun Lee"},{"@pid":"92/5955","text":"Lajos Hanzo"}]},"title":"Iterative Detection and Decoding for Hard-Decision Forwarding Aided Cooperative Spatial Multiplexing.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LeeH09","doi":"10.1109/ICC.2009.5199105","ee":"https://doi.org/10.1109/ICC.2009.5199105","url":"https://dblp.org/rec/conf/icc/LeeH09"}, "url":"URL#5146725" }, { "@score":"1", "@id":"5146726", "info":{"authors":{"author":[{"@pid":"92/6683","text":"Juyul Lee"},{"@pid":"28/279","text":"Nihar Jindal"}]},"title":"Delay Constrained Scheduling over Fading Channels: Optimal Policies for Monomial Energy-Cost Functions.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LeeJ09","doi":"10.1109/ICC.2009.5198889","ee":"https://doi.org/10.1109/ICC.2009.5198889","url":"https://dblp.org/rec/conf/icc/LeeJ09"}, "url":"URL#5146726" }, { "@score":"1", "@id":"5146727", "info":{"authors":{"author":[{"@pid":"44/1950","text":"Sookyoung Lee"},{"@pid":"17/5519","text":"Mohamed F. Younis"}]},"title":"QoS-Aware Relay Node Placement in a Segmented Wireless Sensor Network.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LeeY09","doi":"10.1109/ICC.2009.5199381","ee":"https://doi.org/10.1109/ICC.2009.5199381","url":"https://dblp.org/rec/conf/icc/LeeY09"}, "url":"URL#5146727" }, { "@score":"1", "@id":"5146728", "info":{"authors":{"author":[{"@pid":"02/644","text":"Ki-Dong Lee"},{"@pid":"47/6795","text":"Tak-Shing Peter Yum"}]},"title":"On Pareto-Efficiency Between Revenue and Utility in Resource Allocation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LeeY09a","doi":"10.1109/ICC.2009.5199245","ee":"https://doi.org/10.1109/ICC.2009.5199245","url":"https://dblp.org/rec/conf/icc/LeeY09a"}, "url":"URL#5146728" }, { "@score":"1", "@id":"5146729", "info":{"authors":{"author":[{"@pid":"33/4545","text":"Jeremie Leguay"},{"@pid":"07/2527","text":"Hicham Khalife"},{"@pid":"19/7881","text":"Georgios Sotiropoulos"},{"@pid":"36/403","text":"Vania Conan"},{"@pid":"61/2796","text":"Naceur Malouch"}]},"title":"Non Disruptive Data Services Towards Real-Time Traffic in Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LeguayKSCM09","doi":"10.1109/ICC.2009.5199223","ee":"https://doi.org/10.1109/ICC.2009.5199223","url":"https://dblp.org/rec/conf/icc/LeguayKSCM09"}, "url":"URL#5146729" }, { "@score":"1", "@id":"5146730", "info":{"authors":{"author":[{"@pid":"69/805","text":"Frank Lehrieder"},{"@pid":"80/2984","text":"Michael Menth"}]},"title":"PCN-Based Flow Termination with Multiple Bottleneck Links.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LehriederM09","doi":"10.1109/ICC.2009.5199304","ee":"https://doi.org/10.1109/ICC.2009.5199304","url":"https://dblp.org/rec/conf/icc/LehriederM09"}, "url":"URL#5146730" }, { "@score":"1", "@id":"5146731", "info":{"authors":{"author":[{"@pid":"69/805","text":"Frank Lehrieder"},{"@pid":"80/2984","text":"Michael Menth"}]},"title":"Marking Conversion for Pre-Congestion Notification.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LehriederM09a","doi":"10.1109/ICC.2009.5199164","ee":"https://doi.org/10.1109/ICC.2009.5199164","url":"https://dblp.org/rec/conf/icc/LehriederM09a"}, "url":"URL#5146731" }, { "@score":"1", "@id":"5146732", "info":{"authors":{"author":{"@pid":"48/128","text":"Husheng Li"}},"title":"Restless Watchdog: Monitoring Multiple Bands with Blind Period in Cognitive Radio Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Li09","doi":"10.1109/ICC.2009.5199416","ee":"https://doi.org/10.1109/ICC.2009.5199416","url":"https://dblp.org/rec/conf/icc/Li09"}, "url":"URL#5146732" }, { "@score":"1", "@id":"5146733", "info":{"authors":{"author":[{"@pid":"34/7884","text":"Zhongbo Li"},{"@pid":"59/7824","text":"Stefan Bruhn"},{"@pid":"61/5354","text":"Shenghui Zhao"},{"@pid":"15/1823-1","text":"Jingming Kuang 0001"}]},"title":"Analytical and Experimental Comparison of Packet Loss Recovery Methods Based on AMR-WB for VoIP.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiBZK09","doi":"10.1109/ICC.2009.5198749","ee":"https://doi.org/10.1109/ICC.2009.5198749","url":"https://dblp.org/rec/conf/icc/LiBZK09"}, "url":"URL#5146733" }, { "@score":"1", "@id":"5146734", "info":{"authors":{"author":[{"@pid":"11/3140-1","text":"Zan Li 0001"},{"@pid":"64/2800","text":"Jueping Cai"},{"@pid":"96/7005","text":"Xiaofeng Lu"},{"@pid":"93/7882","text":"Jiangbo Si"}]},"title":"Complexity Measure of FH/SS Sequences Using Approximate Entropy.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiCLS09","doi":"10.1109/ICC.2009.5198838","ee":"https://doi.org/10.1109/ICC.2009.5198838","url":"https://dblp.org/rec/conf/icc/LiCLS09"}, "url":"URL#5146734" }, { "@score":"1", "@id":"5146735", "info":{"authors":{"author":[{"@pid":"25/3528-1","text":"Xu Li 0001"},{"@pid":"f/HannesFrey","text":"Hannes Frey"},{"@pid":"s/NicolaSantoro","text":"Nicola Santoro"},{"@pid":"s/IvanStojmenovic","text":"Ivan Stojmenovic"}]},"title":"Localized Sensor Self-Deployment for Guaranteed Coverage Radius Maximization.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiFSS09","doi":"10.1109/ICC.2009.5199144","ee":"https://doi.org/10.1109/ICC.2009.5199144","url":"https://dblp.org/rec/conf/icc/LiFSS09"}, "url":"URL#5146735" }, { "@score":"1", "@id":"5146736", "info":{"authors":{"author":[{"@pid":"00/5984","text":"Qiao Li"},{"@pid":"44/2936","text":"Pingyi Fan"},{"@pid":"88/1600","text":"Dapeng Oliver Wu"}]},"title":"Energy Efficient Routing in Ad Hoc Networks with Nakagami-m Fading Channels.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiFW09","doi":"10.1109/ICC.2009.5198992","ee":"https://doi.org/10.1109/ICC.2009.5198992","url":"https://dblp.org/rec/conf/icc/LiFW09"}, "url":"URL#5146736" }, { "@score":"1", "@id":"5146737", "info":{"authors":{"author":[{"@pid":"12/7882","text":"Ting-Ge Li"},{"@pid":"48/6526","text":"Chih-Cheng Hsu"},{"@pid":"88/1480","text":"Cheng-Fu Chou"}]},"title":"On Reliable Transmission by Adaptive Network Coding in Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiHC09","doi":"10.1109/ICC.2009.5199247","ee":"https://doi.org/10.1109/ICC.2009.5199247","url":"https://dblp.org/rec/conf/icc/LiHC09"}, "url":"URL#5146737" }, { "@score":"1", "@id":"5146738", "info":{"authors":{"author":[{"@pid":"92/2954-20","text":"Feng Li 0020"},{"@pid":"73/5832","text":"Hamid Jafarkhani"}]},"title":"Interference Cancellation and Detection Using Precoders.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiJ09","doi":"10.1109/ICC.2009.5199091","ee":"https://doi.org/10.1109/ICC.2009.5199091","url":"https://dblp.org/rec/conf/icc/LiJ09"}, "url":"URL#5146738" }, { "@score":"1", "@id":"5146739", "info":{"authors":{"author":[{"@pid":"46/2311-4","text":"Xi Li 0004"},{"@pid":"83/2179-1","text":"Hong Ji 0001"},{"@pid":"16/6654","text":"F. Richard Yu"},{"@pid":"69/3546","text":"Ruiming Zheng"}]},"title":"A FCM-Based Peer Grouping Scheme for Node Failure Recovery in Wireless P2P File Sharing.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiJYZ09","doi":"10.1109/ICC.2009.5198602","ee":"https://doi.org/10.1109/ICC.2009.5198602","url":"https://dblp.org/rec/conf/icc/LiJYZ09"}, "url":"URL#5146739" }, { "@score":"1", "@id":"5146740", "info":{"authors":{"author":[{"@pid":"37/4190","text":"Yang Li"},{"@pid":"37/5988","text":"Dong-Won Kum"},{"@pid":"22/2330","text":"Won-Kyeong Seo"},{"@pid":"10/108","text":"You Ze Cho"}]},"title":"A Multihoming Support Scheme with Localized Shim Protocol in Proxy Mobile IPv6.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiKSC09","doi":"10.1109/ICC.2009.5198634","ee":"https://doi.org/10.1109/ICC.2009.5198634","url":"https://dblp.org/rec/conf/icc/LiKSC09"}, "url":"URL#5146740" }, { "@score":"1", "@id":"5146741", "info":{"authors":{"author":[{"@pid":"94/5278","text":"Sanping Li"},{"@pid":"25/2208","text":"Yan Luo"}]},"title":"Discernibility Analysis and Accuracy Improvement of Machine Learning Algorithms for Network Intrusion Detection.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiL09","doi":"10.1109/ICC.2009.5305953","ee":"https://doi.org/10.1109/ICC.2009.5305953","url":"https://dblp.org/rec/conf/icc/LiL09"}, "url":"URL#5146741" }, { "@score":"1", "@id":"5146742", "info":{"authors":{"author":[{"@pid":"63/1303-24","text":"Ting Li 0024"},{"@pid":"07/6819","text":"Jason Liu"}]},"title":"A Fluid Background Traffic Model.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiL09a","doi":"10.1109/ICC.2009.5198605","ee":"https://doi.org/10.1109/ICC.2009.5198605","url":"https://dblp.org/rec/conf/icc/LiL09a"}, "url":"URL#5146742" }, { "@score":"1", "@id":"5146743", "info":{"authors":{"author":[{"@pid":"41/7882","text":"Qiuhui Li"},{"@pid":"l/JohnCSLui","text":"John Chi-Shing Lui"}]},"title":"On Modeling Clustering Indexes of BT-Like Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiL09b","doi":"10.1109/ICC.2009.5199243","ee":"https://doi.org/10.1109/ICC.2009.5199243","url":"https://dblp.org/rec/conf/icc/LiL09b"}, "url":"URL#5146743" }, { "@score":"1", "@id":"5146744", "info":{"authors":{"author":[{"@pid":"01/405","text":"Hongxing Li"},{"@pid":"99/5168-1","text":"Hanwen Luo 0001"},{"@pid":"96/1149","text":"Xinbing Wang"},{"@pid":"71/3212-2","text":"Chengyu Lin 0002"},{"@pid":"20/236","text":"Chisheng Li"}]},"title":"Fairness-Aware Resource Allocation in OFDMA Cooperative Relaying Network.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiLWLL09","doi":"10.1109/ICC.2009.5199025","ee":"https://doi.org/10.1109/ICC.2009.5199025","url":"https://dblp.org/rec/conf/icc/LiLWLL09"}, "url":"URL#5146744" }, { "@score":"1", "@id":"5146745", "info":{"authors":{"author":[{"@pid":"82/0-1","text":"Min Li 0001"},{"@pid":"87/4350","text":"David Novo"},{"@pid":"05/6709","text":"Bruno Bougard"},{"@pid":"99/3677","text":"Claude Desset"},{"@pid":"93/2764","text":"Antoine Dejonghe"},{"@pid":"45/24","text":"Liesbet Van der Perre"},{"@pid":"61/3302","text":"Francky Catthoor"}]},"title":"A System Level Algorithmic Approach toward Energy-Aware SDR Baseband Implementations.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiNBDDPC09","doi":"10.1109/ICC.2009.5198680","ee":"https://doi.org/10.1109/ICC.2009.5198680","url":"https://dblp.org/rec/conf/icc/LiNBDDPC09"}, "url":"URL#5146745" }, { "@score":"1", "@id":"5146746", "info":{"authors":{"author":[{"@pid":"32/1000","text":"Yang-Yang Li"},{"@pid":"21/5889","text":"Elvino S. Sousa"}]},"title":"Base Station Pilot Management for User-Deployed Cellular Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiS09","doi":"10.1109/ICC.2009.5198778","ee":"https://doi.org/10.1109/ICC.2009.5198778","url":"https://dblp.org/rec/conf/icc/LiS09"}, "url":"URL#5146746" }, { "@score":"1", "@id":"5146747", "info":{"authors":{"author":[{"@pid":"92/2954-1","text":"Feng Li 0001"},{"@pid":"w/JieWu1","text":"Jie Wu 0001"}]},"title":"FRAME: An Innovative Incentive Scheme in Vehicular Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiW09","doi":"10.1109/ICC.2009.5199041","ee":"https://doi.org/10.1109/ICC.2009.5199041","url":"https://dblp.org/rec/conf/icc/LiW09"}, "url":"URL#5146747" }, { "@score":"1", "@id":"5146748", "info":{"authors":{"author":[{"@pid":"92/2954","text":"Feng Li"},{"@pid":"96/1149","text":"Xinbing Wang"},{"@pid":"41/2526","text":"Hsiao-Hwa Chen"}]},"title":"A Modified Exclusion Mechanism and Optimal Routing Algorithm in UWB Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiWC09","doi":"10.1109/ICC.2009.5198630","ee":"https://doi.org/10.1109/ICC.2009.5198630","url":"https://dblp.org/rec/conf/icc/LiWC09"}, "url":"URL#5146748" }, { "@score":"1", "@id":"5146749", "info":{"authors":{"author":[{"@pid":"28/538-1","text":"Gen Li 0001"},{"@pid":"94/3104-2","text":"Ying Wang 0002"},{"@pid":"75/5056-3","text":"Tong Wu 0003"},{"@pid":"14/4834-8","text":"Jing Huang 0008"}]},"title":"Joint Linear Filter Design in Multi-User Non-Regenerative MIMO-Relay Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiWWH09","doi":"10.1109/ICC.2009.5199114","ee":"https://doi.org/10.1109/ICC.2009.5199114","url":"https://dblp.org/rec/conf/icc/LiWWH09"}, "url":"URL#5146749" }, { "@score":"1", "@id":"5146750", "info":{"authors":{"author":[{"@pid":"82/6624","text":"Xiaolong Li"},{"@pid":"83/992","text":"Homayoun Yousefi'zadeh"}]},"title":"Distributed ECN-Based Congestion Control.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiY09","doi":"10.1109/ICC.2009.5198925","ee":"https://doi.org/10.1109/ICC.2009.5198925","url":"https://dblp.org/rec/conf/icc/LiY09"}, "url":"URL#5146750" }, { "@score":"1", "@id":"5146751", "info":{"authors":{"author":[{"@pid":"56/8263","text":"William Weiliang Li"},{"@pid":"80/3143","text":"Ying Jun (Angela) Zhang"},{"@pid":"21/4583","text":"Moe Z. Win"}]},"title":"Slow Adaptive OFDMA via Stochastic Programming.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiZW09","doi":"10.1109/ICC.2009.5199464","ee":"https://doi.org/10.1109/ICC.2009.5199464","url":"https://dblp.org/rec/conf/icc/LiZW09"}, "url":"URL#5146751" }, { "@score":"1", "@id":"5146752", "info":{"authors":{"author":[{"@pid":"23/53","text":"Shiguo Lian"},{"@pid":"66/875","text":"Yuan Dong"},{"@pid":"52/915","text":"Haila Wang"}]},"title":"A Secure Solution for Ubiquitous Multimedia Broadcasting.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LianDW09","doi":"10.1109/ICC.2009.5198666","ee":"https://doi.org/10.1109/ICC.2009.5198666","url":"https://dblp.org/rec/conf/icc/LianDW09"}, "url":"URL#5146752" }, { "@score":"1", "@id":"5146753", "info":{"authors":{"author":{"@pid":"52/5208","text":"Qilian Liang"}},"title":"Situation Understanding Based on Heterogeneous Sensor Networks and Human-Inspired Favor Weak Fuzzy Logic System.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Liang09","doi":"10.1109/ICC.2009.5199462","ee":"https://doi.org/10.1109/ICC.2009.5199462","url":"https://dblp.org/rec/conf/icc/Liang09"}, "url":"URL#5146753" }, { "@score":"1", "@id":"5146754", "info":{"authors":{"author":[{"@pid":"95/3243-2","text":"Jing Liang 0002"},{"@pid":"52/5208","text":"Qilian Liang"}]},"title":"UWB Radar Sensor Networks Detection of Targets in Foliage Using Short-Time Fourier Transform.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiangL09","doi":"10.1109/ICC.2009.5305942","ee":"https://doi.org/10.1109/ICC.2009.5305942","url":"https://dblp.org/rec/conf/icc/LiangL09"}, "url":"URL#5146754" }, { "@score":"1", "@id":"5146755", "info":{"authors":{"author":[{"@pid":"61/3167","text":"Yang-wen Liang"},{"@pid":"95/2265","text":"Robert Schober"}]},"title":"Cooperative Amplify-and-Forward Beamforming for OFDM Systems with Multiple Relays.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiangS09","doi":"10.1109/ICC.2009.5198857","ee":"https://doi.org/10.1109/ICC.2009.5198857","url":"https://dblp.org/rec/conf/icc/LiangS09"}, "url":"URL#5146755" }, { "@score":"1", "@id":"5146756", "info":{"authors":{"author":[{"@pid":"03/1888","text":"Hermann S. Lichte"},{"@pid":"66/4064","text":"Stefan Valentin"},{"@pid":"91/7883","text":"Holger von Malm"},{"@pid":"k/HolgerKarl","text":"Holger Karl"},{"@pid":"88/2258","text":"Akram Bin Sediq"},{"@pid":"94/5314","text":"Imad Aad"}]},"title":"Rate-Per-Link Adaptation in Cooperative Wireless Networks with Multi-Rate Combining.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LichteVMKSA09","doi":"10.1109/ICC.2009.5199393","ee":"https://doi.org/10.1109/ICC.2009.5199393","url":"https://dblp.org/rec/conf/icc/LichteVMKSA09"}, "url":"URL#5146756" }, { "@score":"1", "@id":"5146757", "info":{"authors":{"author":[{"@pid":"l/SoungChangLiew","text":"Soung Chang Liew"},{"@pid":"13/3970","text":"Caihong Kai"},{"@pid":"46/5064","text":"Jason Leung"},{"@pid":"74/4224","text":"Bill Wong"}]},"title":"Back-of-the-Envelope Computation of Throughput Distributions in CSMA Wireless Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiewKLW09","doi":"10.1109/ICC.2009.5198774","ee":"https://doi.org/10.1109/ICC.2009.5198774","url":"https://dblp.org/rec/conf/icc/LiewKLW09"}, "url":"URL#5146757" }, { "@score":"1", "@id":"5146758", "info":{"authors":{"author":[{"@pid":"39/1256","text":"Eric C. Like"},{"@pid":"14/4566","text":"Michael A. Temple"},{"@pid":"75/3122","text":"Steven C. Gustafson"}]},"title":"Adaptive Intra-Symbol SMSE Waveform Design Amidst Coexistent Primary Users.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LikeTG09","doi":"10.1109/ICC.2009.5198702","ee":"https://doi.org/10.1109/ICC.2009.5198702","url":"https://dblp.org/rec/conf/icc/LikeTG09"}, "url":"URL#5146758" }, { "@score":"1", "@id":"5146759", "info":{"authors":{"author":[{"@pid":"99/2649-10","text":"Wei Lin 0010"},{"@pid":"88/3775-2","text":"Yi Tang 0002"},{"@pid":"35/837-1","text":"Bin Liu 0001"},{"@pid":"p/DerekChiWaiPao","text":"Derek Chi-Wai Pao"},{"@pid":"58/6576-6","text":"Xiaofei Wang 0006"}]},"title":"Compact DFA Structure for Multiple Regular Expressions Matching.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LinTLPW09","doi":"10.1109/ICC.2009.5198833","ee":"https://doi.org/10.1109/ICC.2009.5198833","url":"https://dblp.org/rec/conf/icc/LinTLPW09"}, "url":"URL#5146759" }, { "@score":"1", "@id":"5146760", "info":{"authors":{"author":{"@pid":"08/2373","text":"Xian Liu"}},"title":"Capacity Allocation for Long Tailed Traffic in Packet Switching Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Liu09","doi":"10.1109/ICC.2009.5198801","ee":"https://doi.org/10.1109/ICC.2009.5198801","url":"https://dblp.org/rec/conf/icc/Liu09"}, "url":"URL#5146760" }, { "@score":"1", "@id":"5146761", "info":{"authors":{"author":[{"@pid":"35/295","text":"Jian Liu"},{"@pid":"b/BennyBing","text":"Benny Bing"}]},"title":"A New MAC Protocol with Collision Resolution for OFDMA Wireless Mesh Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuB09","doi":"10.1109/ICC.2009.5198642","ee":"https://doi.org/10.1109/ICC.2009.5198642","url":"https://dblp.org/rec/conf/icc/LiuB09"}, "url":"URL#5146761" }, { "@score":"1", "@id":"5146762", "info":{"authors":{"author":[{"@pid":"07/6773-10","text":"Shuo Liu 0010"},{"@pid":"11/1709","text":"Julian Cheng"},{"@pid":"62/6601","text":"Norman C. Beaulieu"}]},"title":"Large SNR Analysis of Diversity Schemes on Rayleigh Channels with Arbitrary Correlation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuCB09","doi":"10.1109/ICC.2009.5199128","ee":"https://doi.org/10.1109/ICC.2009.5199128","url":"https://dblp.org/rec/conf/icc/LiuCB09"}, "url":"URL#5146762" }, { "@score":"1", "@id":"5146763", "info":{"authors":{"author":[{"@pid":"16/3621-2","text":"Juan Liu 0002"},{"@pid":"c/WeiChen2","text":"Wei Chen 0002"},{"@pid":"11/3799-1","text":"Zhigang Cao 0001"},{"@pid":"80/3143","text":"Ying Jun Zhang"},{"@pid":"l/SoungChangLiew","text":"Soung Chang Liew"}]},"title":"Utility-Based User Grouping and Bandwidth Allocation for Wireless Multicast Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuCCZL09","doi":"10.1109/ICC.2009.5199562","ee":"https://doi.org/10.1109/ICC.2009.5199562","url":"https://dblp.org/rec/conf/icc/LiuCCZL09"}, "url":"URL#5146763" }, { "@score":"1", "@id":"5146764", "info":{"authors":{"author":[{"@pid":"25/7881","text":"Ted C.-K. Liu"},{"@pid":"12/6140","text":"Xiaodai Dong"},{"@pid":"69/5837","text":"Wu-Sheng Lu"}]},"title":"Compressed Sensing Maximum Likelihood Channel Estimation for Ultra-Wideband Impulse Radio.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuDL09","doi":"10.1109/ICC.2009.5198842","ee":"https://doi.org/10.1109/ICC.2009.5198842","url":"https://dblp.org/rec/conf/icc/LiuDL09"}, "url":"URL#5146764" }, { "@score":"1", "@id":"5146765", "info":{"authors":{"author":[{"@pid":"29/7584","text":"Yen-Cheng Liu"},{"@pid":"87/7882","text":"Kuhn-Chang Lin"},{"@pid":"53/1760","text":"Yu T. Su"}]},"title":"Initial Synchronization for Multi-Cell OFDMA Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuLS09","doi":"10.1109/ICC.2009.5199084","ee":"https://doi.org/10.1109/ICC.2009.5199084","url":"https://dblp.org/rec/conf/icc/LiuLS09"}, "url":"URL#5146765" }, { "@score":"1", "@id":"5146766", "info":{"authors":{"author":[{"@pid":"10/2639-14","text":"Chen Liu 0014"},{"@pid":"m/MikeHMacGregor","text":"Mike H. MacGregor"},{"@pid":"53/6028","text":"Janelle J. Harms"},{"@pid":"08/7882","text":"Candace Phelps"}]},"title":"Hybrid Resource Allocation in Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuMHP09","doi":"10.1109/ICC.2009.5199059","ee":"https://doi.org/10.1109/ICC.2009.5199059","url":"https://dblp.org/rec/conf/icc/LiuMHP09"}, "url":"URL#5146766" }, { "@score":"1", "@id":"5146767", "info":{"authors":{"author":[{"@pid":"70/4241","text":"Ren Ping Liu"},{"@pid":"206/1455","text":"Gordon J. Sutton"},{"@pid":"07/3441","text":"Iain B. Collings"}]},"title":"A 3-D Markov Chain Queueing Model of IEEE 802.11 DCF with Finite Buffer and Load.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuSC09","doi":"10.1109/ICC.2009.5198576","ee":"https://doi.org/10.1109/ICC.2009.5198576","url":"https://dblp.org/rec/conf/icc/LiuSC09"}, "url":"URL#5146767" }, { "@score":"1", "@id":"5146768", "info":{"authors":{"author":[{"@pid":"34/3258-1","text":"Chunfeng Liu 0001"},{"@pid":"92/6284","text":"Yantai Shu"},{"@pid":"67/7882","text":"Mingyuan Li"},{"@pid":"47/4060","text":"Oliver W. W. Yang"}]},"title":"A New Mechanism to Detect Selfish Behavior in IEEE 802.11 Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuSLY09","doi":"10.1109/ICC.2009.5198643","ee":"https://doi.org/10.1109/ICC.2009.5198643","url":"https://dblp.org/rec/conf/icc/LiuSLY09"}, "url":"URL#5146768" }, { "@score":"1", "@id":"5146769", "info":{"authors":{"author":[{"@pid":"31/6019","text":"Fangming Liu"},{"@pid":"29/795","text":"Ye Sun"},{"@pid":"50/3402-1","text":"Bo Li 0001"},{"@pid":"84/6358","text":"Xinyan Zhang"}]},"title":"Understanding the Roles of Servers in Large-Scale Peer-Assisted Online Storage Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuSLZ09","doi":"10.1109/ICC.2009.5199550","ee":"https://doi.org/10.1109/ICC.2009.5199550","url":"https://dblp.org/rec/conf/icc/LiuSLZ09"}, "url":"URL#5146769" }, { "@score":"1", "@id":"5146770", "info":{"authors":{"author":[{"@pid":"20/5393","text":"Chunhui Liu"},{"@pid":"77/4444","text":"Anke Schmeink"},{"@pid":"m/RMathar","text":"Rudolf Mathar"}]},"title":"Power Allocation for Broadcasting in Multiuser OFDM Systems with Sublinear Complexity.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuSM09","doi":"10.1109/ICC.2009.5199346","ee":"https://doi.org/10.1109/ICC.2009.5199346","url":"https://dblp.org/rec/conf/icc/LiuSM09"}, "url":"URL#5146770" }, { "@score":"1", "@id":"5146771", "info":{"authors":{"author":[{"@pid":"00/3231","text":"Chungui Liu"},{"@pid":"92/6284","text":"Yantai Shu"},{"@pid":"43/3048","text":"Lianfang Zhang"}]},"title":"Capacity Analysis and Experimental Study with Multiple Interfaces and Multiple Channels in 802.11 Mesh Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuSZ09","doi":"10.1109/ICC.2009.5198802","ee":"https://doi.org/10.1109/ICC.2009.5198802","url":"https://dblp.org/rec/conf/icc/LiuSZ09"}, "url":"URL#5146771" }, { "@score":"1", "@id":"5146772", "info":{"authors":{"author":[{"@pid":"95/6404-1","text":"Cong Liu 0001"},{"@pid":"w/JieWu1","text":"Jie Wu 0001"}]},"title":"Efficient Adaptive Routing in Delay Tolerant Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuW09","doi":"10.1109/ICC.2009.5198967","ee":"https://doi.org/10.1109/ICC.2009.5198967","url":"https://dblp.org/rec/conf/icc/LiuW09"}, "url":"URL#5146772" }, { "@score":"1", "@id":"5146773", "info":{"authors":{"author":[{"@pid":"33/4528-16","text":"Li Liu 0016"},{"@pid":"181/1848-1","text":"Yang Xiao 0001"},{"@pid":"71/700","text":"Jingyuan Zhang"}]},"title":"A Linear Time Synchronization Algorithm for Underwater Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuXZ09","doi":"10.1109/ICC.2009.5198622","ee":"https://doi.org/10.1109/ICC.2009.5198622","url":"https://dblp.org/rec/conf/icc/LiuXZ09"}, "url":"URL#5146773" }, { "@score":"1", "@id":"5146774", "info":{"authors":{"author":[{"@pid":"03/2134-37","text":"Jie Liu 0037"},{"@pid":"86/3184","text":"Yuriy V. Zakharov"}]},"title":"FPGA Implementation of RLS Adaptive Filter Using Dichotomous Coordinate Descent Iterations.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuZ09","doi":"10.1109/ICC.2009.5199038","ee":"https://doi.org/10.1109/ICC.2009.5199038","url":"https://dblp.org/rec/conf/icc/LiuZ09"}, "url":"URL#5146774" }, { "@score":"1", "@id":"5146775", "info":{"authors":{"author":[{"@pid":"67/5807","text":"Fang Liu"},{"@pid":"76/1584-1","text":"Xin Zhang 0001"},{"@pid":"06/4240","text":"Zhe Chen"},{"@pid":"47/6911","text":"Yafeng Wang"},{"@pid":"71/9","text":"Dacheng Yang"}]},"title":"Performance Measure Analysis of Amplify-and-Forward Relaying over Non-Identical Nakagami-m Fading Channel.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuZCWY09","doi":"10.1109/ICC.2009.5199329","ee":"https://doi.org/10.1109/ICC.2009.5199329","url":"https://dblp.org/rec/conf/icc/LiuZCWY09"}, "url":"URL#5146775" }, { "@score":"1", "@id":"5146776", "info":{"authors":{"author":[{"@pid":"15/2420","text":"Erwu Liu"},{"@pid":"67/5186","text":"Qinqing Zhang"},{"@pid":"04/2707","text":"Kin K. Leung"}]},"title":"Theoretical Analysis of Selective Relaying, Cooperative Multi-Hop Networks with Fairness Constraints.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuZL09","doi":"10.1109/ICC.2009.5199520","ee":"https://doi.org/10.1109/ICC.2009.5199520","url":"https://dblp.org/rec/conf/icc/LiuZL09"}, "url":"URL#5146776" }, { "@score":"1", "@id":"5146777", "info":{"authors":{"author":[{"@pid":"15/2420","text":"Erwu Liu"},{"@pid":"67/5186","text":"Qinqing Zhang"},{"@pid":"04/2707","text":"Kin K. Leung"}]},"title":"Resource Allocation for Frequency-Selective Fading, Multi-Carrier Systems with Fairness Constraints.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuZL09a","doi":"10.1109/ICC.2009.5199411","ee":"https://doi.org/10.1109/ICC.2009.5199411","url":"https://dblp.org/rec/conf/icc/LiuZL09a"}, "url":"URL#5146777" }, { "@score":"1", "@id":"5146778", "info":{"authors":{"author":[{"@pid":"10/6178-1","text":"Liang Liu 0001"},{"@pid":"87/1222-5","text":"Xi Zhang 0005"},{"@pid":"04/6217","text":"Huadong Ma"}]},"title":"Exposure-Path Prevention in Directional Sensor Networks Using Sector Model Based Percolation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiuZM09","doi":"10.1109/ICC.2009.5199019","ee":"https://doi.org/10.1109/ICC.2009.5199019","url":"https://dblp.org/rec/conf/icc/LiuZM09"}, "url":"URL#5146778" }, { "@score":"1", "@id":"5146779", "info":{"authors":{"author":[{"@pid":"68/5804","text":"Gianluigi Liva"},{"@pid":"42/5435","text":"Balázs Matuz"},{"@pid":"59/7883","text":"Zoltán Katona"},{"@pid":"16/5695","text":"Enrico Paolini"},{"@pid":"97/6599","text":"Marco Chiani"}]},"title":"On Construction of Moderate-Length LDPC Codes over Correlated Erasure Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LivaMKPC09","doi":"10.1109/ICC.2009.5199238","ee":"https://doi.org/10.1109/ICC.2009.5199238","url":"https://dblp.org/rec/conf/icc/LivaMKPC09"}, "url":"URL#5146779" }, { "@score":"1", "@id":"5146780", "info":{"authors":{"author":[{"@pid":"08/2177","text":"Maduranga Liyanage"},{"@pid":"02/3275","text":"Iwao Sasase"}]},"title":"Steady-State Kalman Filtering for Channel Estimation in OFDM Systems Utilizing SNR.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LiyanageS09","doi":"10.1109/ICC.2009.5199491","ee":"https://doi.org/10.1109/ICC.2009.5199491","url":"https://dblp.org/rec/conf/icc/LiyanageS09"}, "url":"URL#5146780" }, { "@score":"1", "@id":"5146781", "info":{"authors":{"author":[{"@pid":"70/2411","text":"Hans-Peter Löb"},{"@pid":"46/6602","text":"Christian Sauer 0001"}]},"title":"A Modular Reference Application for IEEE 802.11n Wireless LAN MACs.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LobS09","doi":"10.1109/ICC.2009.5198631","ee":"https://doi.org/10.1109/ICC.2009.5198631","url":"https://dblp.org/rec/conf/icc/LobS09"}, "url":"URL#5146781" }, { "@score":"1", "@id":"5146782", "info":{"authors":{"author":[{"@pid":"27/3720","text":"Eduardo Lopez-Estraviz"},{"@pid":"05/3174","text":"Valéry Ramon"},{"@pid":"29/1532","text":"André Bourdoux"},{"@pid":"45/24","text":"Liesbet Van der Perre"}]},"title":"Symbol Based Search Space Constraining for Complexity/Performance Scalable Near ML Detection in Spatial Multiplexing MIMO OFDM Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Lopez-EstravizRBP09","doi":"10.1109/ICC.2009.5199504","ee":"https://doi.org/10.1109/ICC.2009.5199504","url":"https://dblp.org/rec/conf/icc/Lopez-EstravizRBP09"}, "url":"URL#5146782" }, { "@score":"1", "@id":"5146783", "info":{"authors":{"author":[{"@pid":"08/4084","text":"Raymond H. Y. Louie"},{"@pid":"59/6828-1","text":"Yonghui Li 0001"},{"@pid":"84/3821","text":"Branka Vucetic"}]},"title":"Zero Forcing Processing in Two Hop Networks with Multiple Source, Relay and Destination Nodes.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LouieLV09","doi":"10.1109/ICC.2009.5199577","ee":"https://doi.org/10.1109/ICC.2009.5199577","url":"https://dblp.org/rec/conf/icc/LouieLV09"}, "url":"URL#5146783" }, { "@score":"1", "@id":"5146784", "info":{"authors":{"author":[{"@pid":"08/4084","text":"Raymond H. Y. Louie"},{"@pid":"51/5954","text":"Matthew R. McKay"},{"@pid":"07/3441","text":"Iain B. Collings"}]},"title":"Spatial Multiplexing with MRC and ZF Receivers in Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LouieMC09","doi":"10.1109/ICC.2009.5199472","ee":"https://doi.org/10.1109/ICC.2009.5199472","url":"https://dblp.org/rec/conf/icc/LouieMC09"}, "url":"URL#5146784" }, { "@score":"1", "@id":"5146785", "info":{"authors":{"author":[{"@pid":"49/878","text":"Jérôme Louveaux"},{"@pid":"32/907","text":"Ali Kalakech"},{"@pid":"36/6793","text":"Mamoun Guenach"},{"@pid":"49/6382","text":"Jochen Maes"},{"@pid":"53/3039","text":"Michaël Peeters"},{"@pid":"v/LucVandendorpe","text":"Luc Vandendorpe"}]},"title":"An SNR-Assisted Crosstalk Channel Estimation Technique.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LouveauxKGMPV09","doi":"10.1109/ICC.2009.5198739","ee":"https://doi.org/10.1109/ICC.2009.5198739","url":"https://dblp.org/rec/conf/icc/LouveauxKGMPV09"}, "url":"URL#5146785" }, { "@score":"1", "@id":"5146786", "info":{"authors":{"author":[{"@pid":"63/5137","text":"Chung-Chin Lu"},{"@pid":"02/7882","text":"Shih-Chuan Chou"},{"@pid":"64/7882","text":"Dong-Tsai Huang"}]},"title":"A Design of Space-Time Codes for CPFSK Modulation over Multipath Fading Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LuCH09","doi":"10.1109/ICC.2009.5198591","ee":"https://doi.org/10.1109/ICC.2009.5198591","url":"https://dblp.org/rec/conf/icc/LuCH09"}, "url":"URL#5146786" }, { "@score":"1", "@id":"5146787", "info":{"authors":{"author":[{"@pid":"45/3906","text":"Kejie Lu"},{"@pid":"65/3633","text":"Shengli Fu"},{"@pid":"84/4625-1","text":"Yi Qian 0001"},{"@pid":"15/4777-43","text":"Tao Zhang 0043"}]},"title":"On the Security Performance of Physical-Layer Network Coding.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LuFQZ09","doi":"10.1109/ICC.2009.5199266","ee":"https://doi.org/10.1109/ICC.2009.5199266","url":"https://dblp.org/rec/conf/icc/LuFQZ09"}, "url":"URL#5146787" }, { "@score":"1", "@id":"5146788", "info":{"authors":{"author":[{"@pid":"34/1169","text":"Liru Lu"},{"@pid":"99/2339","text":"Kwok Hung Li"},{"@pid":"19/5809-1","text":"Yong Liang Guan 0001"}]},"title":"Blind Detection of Interleaver Parameters for Non-Binary Coded Data Streams.","venue":"ICC","pages":"1-4","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LuLG09","doi":"10.1109/ICC.2009.5198791","ee":"https://doi.org/10.1109/ICC.2009.5198791","url":"https://dblp.org/rec/conf/icc/LuLG09"}, "url":"URL#5146788" }, { "@score":"1", "@id":"5146789", "info":{"authors":{"author":[{"@pid":"16/6714","text":"Hancheng Lu"},{"@pid":"25/3972-1","text":"Feng Wu 0001"},{"@pid":"29/4638","text":"Chang Wen Chen"}]},"title":"Stateful Scheduling with Network Coding for Roadside-to-Vehicle Communication.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LuWC09","doi":"10.1109/ICC.2009.5305943","ee":"https://doi.org/10.1109/ICC.2009.5305943","url":"https://dblp.org/rec/conf/icc/LuWC09"}, "url":"URL#5146789" }, { "@score":"1", "@id":"5146790", "info":{"authors":{"author":[{"@pid":"96/3518","text":"Daniel Enrique Lucani"},{"@pid":"19/6557","text":"Milica Stojanovic"},{"@pid":"m/MurielMedard","text":"Muriel Médard"}]},"title":"Random Linear Network Coding for Time Division Duplexing: Energy Analysis.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LucaniSM09","doi":"10.1109/ICC.2009.5199387","ee":"https://doi.org/10.1109/ICC.2009.5199387","url":"https://dblp.org/rec/conf/icc/LucaniSM09"}, "url":"URL#5146790" }, { "@score":"1", "@id":"5146791", "info":{"authors":{"author":[{"@pid":"12/6127","text":"Diego Lucerna"},{"@pid":"30/469","text":"Andrea Baruffaldi"},{"@pid":"11/6844","text":"Massimo Tornatore"},{"@pid":"36/6659","text":"Achille Pattavina"}]},"title":"On the Efficiency of Dynamic Routing of Connections with Known Duration.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LucernaBTP09","doi":"10.1109/ICC.2009.5199253","ee":"https://doi.org/10.1109/ICC.2009.5199253","url":"https://dblp.org/rec/conf/icc/LucernaBTP09"}, "url":"URL#5146791" }, { "@score":"1", "@id":"5146792", "info":{"authors":{"author":[{"@pid":"57/4378","text":"Michele Luglio"},{"@pid":"08/373","text":"Cesare Roseti"},{"@pid":"89/1290","text":"Francesco Zampognaro"}]},"title":"Improving Performance of TCP-Based Applications over DVB-RCS Links.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LuglioRZ09","doi":"10.1109/ICC.2009.5199077","ee":"https://doi.org/10.1109/ICC.2009.5199077","url":"https://dblp.org/rec/conf/icc/LuglioRZ09"}, "url":"URL#5146792" }, { "@score":"1", "@id":"5146793", "info":{"authors":{"author":[{"@pid":"09/6321","text":"Michael Lunglmayr"},{"@pid":"51/5469","text":"Jens Berkmann"},{"@pid":"87/983","text":"Mario Huemer"}]},"title":"Vertex Packing Decoding.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LunglmayrBH09","doi":"10.1109/ICC.2009.5199565","ee":"https://doi.org/10.1109/ICC.2009.5199565","url":"https://dblp.org/rec/conf/icc/LunglmayrBH09"}, "url":"URL#5146793" }, { "@score":"1", "@id":"5146794", "info":{"authors":{"author":[{"@pid":"63/7882","text":"Weizhi Luo"},{"@pid":"70/2129","text":"Eliane L. Bodanese"}]},"title":"Optimising Radio Access in a Heterogeneous Wireless Network Environment.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LuoB09","doi":"10.1109/ICC.2009.5199291","ee":"https://doi.org/10.1109/ICC.2009.5199291","url":"https://dblp.org/rec/conf/icc/LuoB09"}, "url":"URL#5146794" }, { "@score":"1", "@id":"5146795", "info":{"authors":{"author":[{"@pid":"53/1565","text":"Xiapu Luo"},{"@pid":"73/5303","text":"Edmond W. W. Chan"},{"@pid":"87/4986","text":"Rocky K. C. Chang"}]},"title":"CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LuoCC09","doi":"10.1109/ICC.2009.5198826","ee":"https://doi.org/10.1109/ICC.2009.5198826","url":"https://dblp.org/rec/conf/icc/LuoCC09"}, "url":"URL#5146795" }, { "@score":"1", "@id":"5146796", "info":{"authors":{"author":[{"@pid":"34/3128-1","text":"Jian Luo 0001"},{"@pid":"89/3819","text":"Andreas Kortke"},{"@pid":"30/322","text":"Wilhelm Keusgen"}]},"title":"Antenna Diversity Schemes for Uplink Frequency-Domain Multiuser Detection in CP-Assisted DS-CDMA Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LuoKK09","doi":"10.1109/ICC.2009.5198752","ee":"https://doi.org/10.1109/ICC.2009.5198752","url":"https://dblp.org/rec/conf/icc/LuoKK09"}, "url":"URL#5146796" }, { "@score":"1", "@id":"5146797", "info":{"authors":{"author":[{"@pid":"11/6127","text":"Haiyan Luo"},{"@pid":"63/6682","text":"Dalei Wu"},{"@pid":"61/108","text":"Song Ci"},{"@pid":"12/854","text":"Hamid Sharif"},{"@pid":"37/5192-1","text":"Hui Tang 0001"}]},"title":"TFRC-Based Rate Control for Real-Time Video Streaming over Wireless Multi-Hop Mesh Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LuoWCST09","doi":"10.1109/ICC.2009.5199511","ee":"https://doi.org/10.1109/ICC.2009.5199511","url":"https://dblp.org/rec/conf/icc/LuoWCST09"}, "url":"URL#5146797" }, { "@score":"1", "@id":"5146798", "info":{"authors":{"author":[{"@pid":"25/2208","text":"Yan Luo"},{"@pid":"61/860","text":"Ke Xiang"},{"@pid":"63/4364-2","text":"Jie Fan 0002"},{"@pid":"62/3401","text":"Chunhui Zhang"}]},"title":"Distributed Intrusion Detection with Intelligent Network Interfaces for Future Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LuoXFZ09","doi":"10.1109/ICC.2009.5198928","ee":"https://doi.org/10.1109/ICC.2009.5198928","url":"https://dblp.org/rec/conf/icc/LuoXFZ09"}, "url":"URL#5146798" }, { "@score":"1", "@id":"5146799", "info":{"authors":{"author":[{"@pid":"83/152","text":"Qian Lv"},{"@pid":"49/1085","text":"George N. Rouskas"}]},"title":"An Economic Model for Pricing Tiered Network Services.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LvR09","doi":"10.1109/ICC.2009.5198723","ee":"https://doi.org/10.1109/ICC.2009.5198723","url":"https://dblp.org/rec/conf/icc/LvR09"}, "url":"URL#5146799" }, { "@score":"1", "@id":"5146800", "info":{"authors":{"author":[{"@pid":"65/4062-1","text":"Hui Lv 0001"},{"@pid":"21/3569","text":"Hongkai Xiong"},{"@pid":"20/872-1","text":"Li Song 0001"},{"@pid":"23/4027","text":"Zhihai He"},{"@pid":"c/TsuhanChen","text":"Tsuhan Chen"}]},"title":"Graph Matching Based Side Information Generation for Distributed Multi-View Video Coding.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/LvXSHC09","doi":"10.1109/ICC.2009.5199048","ee":"https://doi.org/10.1109/ICC.2009.5199048","url":"https://dblp.org/rec/conf/icc/LvXSHC09"}, "url":"URL#5146800" }, { "@score":"1", "@id":"5146801", "info":{"authors":{"author":[{"@pid":"39/914","text":"Yaozhou Ma"},{"@pid":"76/4975","text":"Abbas Jamalipour"}]},"title":"Cooperative Content Dissemination in Intermittently Connected Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MaJ09","doi":"10.1109/ICC.2009.5198860","ee":"https://doi.org/10.1109/ICC.2009.5198860","url":"https://dblp.org/rec/conf/icc/MaJ09"}, "url":"URL#5146801" }, { "@score":"1", "@id":"5146802", "info":{"authors":{"author":[{"@pid":"94/926-1","text":"Huanfei Ma 0001"},{"@pid":"82/795","text":"Haibin Kan"}]},"title":"Space-Time Coding and Processing with Differential Chaos Shift Keying Scheme.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MaK09","doi":"10.1109/ICC.2009.5199469","ee":"https://doi.org/10.1109/ICC.2009.5199469","url":"https://dblp.org/rec/conf/icc/MaK09"}, "url":"URL#5146802" }, { "@score":"1", "@id":"5146803", "info":{"authors":{"author":[{"@pid":"85/6836-4","text":"Yao Ma 0004"},{"@pid":"14/4729","text":"Alex Leith"},{"@pid":"84/4625","text":"Yi Qian"}]},"title":"Traffic-Matching Revenue-Rate Maximization Scheduling for Downlink OFDMA.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MaLQ09","doi":"10.1109/ICC.2009.5199538","ee":"https://doi.org/10.1109/ICC.2009.5199538","url":"https://dblp.org/rec/conf/icc/MaLQ09"}, "url":"URL#5146803" }, { "@score":"1", "@id":"5146804", "info":{"authors":{"author":[{"@pid":"91/4845-7","text":"Jun Ma 0007"},{"@pid":"10/3164","text":"Philip V. Orlik"},{"@pid":"60/3446","text":"Jinyun Zhang"},{"@pid":"89/5914","text":"Ye (Geoffrey) Li"}]},"title":"Pilot Matrix Design for Interim Channel Estimation in Two-Hop MIMO AF Relay Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MaOZL09","doi":"10.1109/ICC.2009.5199340","ee":"https://doi.org/10.1109/ICC.2009.5199340","url":"https://dblp.org/rec/conf/icc/MaOZL09"}, "url":"URL#5146804" }, { "@score":"1", "@id":"5146805", "info":{"authors":{"author":[{"@pid":"85/6836-4","text":"Yao Ma 0004"},{"@pid":"95/2265","text":"Robert Schober"},{"@pid":"97/5058","text":"Subbarayan Pasupathy"}]},"title":"Weighted Sum-Rate Maximization Scheduling for MIMO Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MaSP09","doi":"10.1109/ICC.2009.5199573","ee":"https://doi.org/10.1109/ICC.2009.5199573","url":"https://dblp.org/rec/conf/icc/MaSP09"}, "url":"URL#5146805" }, { "@score":"1", "@id":"5146806", "info":{"authors":{"author":[{"@pid":"02/6863","text":"Guanjun Ma"},{"@pid":"40/689","text":"Yinlong Xu"},{"@pid":"64/7883","text":"Kaiqian Ou"},{"@pid":"42/5205","text":"Wen Luo"}]},"title":"How Can Network Coding Help P2P Content Distribution?","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MaXOL09","doi":"10.1109/ICC.2009.5199055","ee":"https://doi.org/10.1109/ICC.2009.5199055","url":"https://dblp.org/rec/conf/icc/MaXOL09"}, "url":"URL#5146806" }, { "@score":"1", "@id":"5146807", "info":{"authors":{"author":[{"@pid":"23/5470","text":"Richard MacKenzie"},{"@pid":"72/6726","text":"David Hands"},{"@pid":"34/6188","text":"Timothy O'Farrell"}]},"title":"QoS of Video Delivered over 802.11e WLANs.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MacKenzieHO09","doi":"10.1109/ICC.2009.5199378","ee":"https://doi.org/10.1109/ICC.2009.5199378","url":"https://dblp.org/rec/conf/icc/MacKenzieHO09"}, "url":"URL#5146807" }, { "@score":"1", "@id":"5146808", "info":{"authors":{"author":[{"@pid":"84/5908","text":"Max do Val Machado"},{"@pid":"59/3719","text":"Raquel A. F. Mini"},{"@pid":"l/AntonioAlfredoFerreiraLoureiro","text":"Antonio Alfredo Ferreira Loureiro"}]},"title":"A Combined Approach for Receiver-Based MAC and Network Layers in Wireless Sensor Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MachadoML09","doi":"10.1109/ICC.2009.5198582","ee":"https://doi.org/10.1109/ICC.2009.5198582","url":"https://dblp.org/rec/conf/icc/MachadoML09"}, "url":"URL#5146808" }, { "@score":"1", "@id":"5146809", "info":{"authors":{"author":[{"@pid":"99/568","text":"Masoud Ghoreishi Madiseh"},{"@pid":"87/7883","text":"Shuai He"},{"@pid":"20/6237","text":"Michael L. McGuire"},{"@pid":"64/4357","text":"Stephen W. Neville"},{"@pid":"12/6140","text":"Xiaodai Dong"}]},"title":"Verification of Secret Key Generation from UWB Channel Observations.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MadisehHMND09","doi":"10.1109/ICC.2009.5199564","ee":"https://doi.org/10.1109/ICC.2009.5199564","url":"https://dblp.org/rec/conf/icc/MadisehHMND09"}, "url":"URL#5146809" }, { "@score":"1", "@id":"5146810", "info":{"authors":{"author":[{"@pid":"49/6382","text":"Jochen Maes"},{"@pid":"36/6793","text":"Mamoun Guenach"},{"@pid":"53/3039","text":"Michaël Peeters"}]},"title":"Statistical MIMO Channel Model for Gain Quantification of DSL Crosstalk Mitigation Techniques.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MaesGP09","doi":"10.1109/ICC.2009.5199490","ee":"https://doi.org/10.1109/ICC.2009.5199490","url":"https://dblp.org/rec/conf/icc/MaesGP09"}, "url":"URL#5146810" }, { "@score":"1", "@id":"5146811", "info":{"authors":{"author":[{"@pid":"72/7881","text":"Karina Magalhães"},{"@pid":"79/6780","text":"Ricardo Dahab"}]},"title":"SB-RAWVec - A Semi-Blind Watermarking Method for Vector Maps.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MagalhaesD09","doi":"10.1109/ICC.2009.5199433","ee":"https://doi.org/10.1109/ICC.2009.5199433","url":"https://dblp.org/rec/conf/icc/MagalhaesD09"}, "url":"URL#5146811" }, { "@score":"1", "@id":"5146812", "info":{"authors":{"author":[{"@pid":"73/5075","text":"Hisham A. Mahmoud"},{"@pid":"67/1416","text":"Hüseyin Arslan"},{"@pid":"120/8121","text":"Mehmet Kemal Özdemir"},{"@pid":"40/7883","text":"Francis E. Retnasothie"}]},"title":"IQ Imbalance Correction for OFDMA Uplink Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MahmoudAOR09","doi":"10.1109/ICC.2009.5199104","ee":"https://doi.org/10.1109/ICC.2009.5199104","url":"https://dblp.org/rec/conf/icc/MahmoudAOR09"}, "url":"URL#5146812" }, { "@score":"1", "@id":"5146813", "info":{"authors":{"author":[{"@pid":"117/8481","text":"Mohamed Elsalih Mahmoud"},{"@pid":"s/XueminShen","text":"Xuemin (Sherman) Shen"}]},"title":"DSC: Cooperation Incentive Mechanism for Multi-Hop Cellular Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MahmoudS09","doi":"10.1109/ICC.2009.5198949","ee":"https://doi.org/10.1109/ICC.2009.5198949","url":"https://dblp.org/rec/conf/icc/MahmoudS09"}, "url":"URL#5146813" }, { "@score":"1", "@id":"5146814", "info":{"authors":{"author":[{"@pid":"117/8481","text":"Mohamed Elsalih Mahmoud"},{"@pid":"s/XueminShen","text":"Xuemin (Sherman) Shen"}]},"title":"Anonymous and Authenticated Routing in Multi-Hop Cellular Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MahmoudS09a","doi":"10.1109/ICC.2009.5198751","ee":"https://doi.org/10.1109/ICC.2009.5198751","url":"https://dblp.org/rec/conf/icc/MahmoudS09a"}, "url":"URL#5146814" }, { "@score":"1", "@id":"5146815", "info":{"authors":{"author":[{"@pid":"00/2647","text":"Shashank V. Maiya"},{"@pid":"71/1882","text":"Thomas E. Fuja"}]},"title":"Routing and Spectral Efficiency in Fading with Alamouti Coding at Two Parallel Relays.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MaiyaF09","doi":"10.1109/ICC.2009.5199426","ee":"https://doi.org/10.1109/ICC.2009.5199426","url":"https://dblp.org/rec/conf/icc/MaiyaF09"}, "url":"URL#5146815" }, { "@score":"1", "@id":"5146816", "info":{"authors":{"author":[{"@pid":"26/4118","text":"Vinay R. Majjigi"},{"@pid":"69/780","text":"Rajiv Agarwal"},{"@pid":"40/1964","text":"John M. Cioffi"}]},"title":"User Profiling: A Method for Limited Feedback in OFDMA Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MajjigiAC09","doi":"10.1109/ICC.2009.5199554","ee":"https://doi.org/10.1109/ICC.2009.5199554","url":"https://dblp.org/rec/conf/icc/MajjigiAC09"}, "url":"URL#5146816" }, { "@score":"1", "@id":"5146817", "info":{"authors":{"author":[{"@pid":"10/5130","text":"Achraf Mallat"},{"@pid":"17/242","text":"Claude Oestges"},{"@pid":"v/LucVandendorpe","text":"Luc Vandendorpe"}]},"title":"CRBs for UWB Multipath Channel Estimation: Impact of the Overlapping Between the MPCs on MPC Gain and TOA Estimation.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MallatOV09","doi":"10.1109/ICC.2009.5198871","ee":"https://doi.org/10.1109/ICC.2009.5198871","url":"https://dblp.org/rec/conf/icc/MallatOV09"}, "url":"URL#5146817" }, { "@score":"1", "@id":"5146818", "info":{"authors":{"author":[{"@pid":"10/5130","text":"Achraf Mallat"},{"@pid":"v/LucVandendorpe","text":"Luc Vandendorpe"}]},"title":"CRBS for the Joint Estimation of TOA and AOA in Wideband MISO and MIMO Systems: Comparison with SISO and SIMO Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MallatV09","doi":"10.1109/ICC.2009.5198870","ee":"https://doi.org/10.1109/ICC.2009.5198870","url":"https://dblp.org/rec/conf/icc/MallatV09"}, "url":"URL#5146818" }, { "@score":"1", "@id":"5146819", "info":{"authors":{"author":[{"@pid":"67/6954","text":"Ranjan K. Mallik"},{"@pid":"84/5395","text":"Jack H. Winters"}]},"title":"Deterministic Combining for Fading Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MallikW09","doi":"10.1109/ICC.2009.5198913","ee":"https://doi.org/10.1109/ICC.2009.5198913","url":"https://dblp.org/rec/conf/icc/MallikW09"}, "url":"URL#5146819" }, { "@score":"1", "@id":"5146820", "info":{"authors":{"author":[{"@pid":"44/5587","text":"Carles Navarro i Manchon"},{"@pid":"36/6543","text":"Bernard H. Fleury"},{"@pid":"66/5652","text":"Gunvor Elisabeth Kirkelund"},{"@pid":"m/PrebenEMogensen","text":"Preben E. Mogensen"},{"@pid":"37/524","text":"Luc Deneire"},{"@pid":"86/6607","text":"Troels B. Sørensen"},{"@pid":"34/6591","text":"Christian Rom"}]},"title":"Channel Estimation Based on Divergence Minimization for OFDM Systems with Co-Channel Interference.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ManchonFKMDSR09","doi":"10.1109/ICC.2009.5198818","ee":"https://doi.org/10.1109/ICC.2009.5198818","url":"https://dblp.org/rec/conf/icc/ManchonFKMDSR09"}, "url":"URL#5146820" }, { "@score":"1", "@id":"5146821", "info":{"authors":{"author":[{"@pid":"93/7881","text":"Mikhail A. Marchenko"},{"@pid":"22/1935","text":"Davide Adami"},{"@pid":"42/3320","text":"Christian Callegari"},{"@pid":"80/6788","text":"Stefano Giordano"},{"@pid":"04/374","text":"Michele Pagano"}]},"title":"Design and Deployment of a Network-Aware Grid for e-Science Applications.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MarchenkoACGP09","doi":"10.1109/ICC.2009.5198898","ee":"https://doi.org/10.1109/ICC.2009.5198898","url":"https://dblp.org/rec/conf/icc/MarchenkoACGP09"}, "url":"URL#5146821" }, { "@score":"1", "@id":"5146822", "info":{"authors":{"author":[{"@pid":"34/3073","text":"Karel-Peet Mare"},{"@pid":"39/8957","text":"Brian Paxton Salmon"},{"@pid":"46/3165","text":"Bodhaswar T. Maharaj"}]},"title":"Performance Gain of Space-Time-Frequency Concatenated LDPC Codes.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MareSM09","doi":"10.1109/ICC.2009.5199327","ee":"https://doi.org/10.1109/ICC.2009.5199327","url":"https://dblp.org/rec/conf/icc/MareSM09"}, "url":"URL#5146822" }, { "@score":"1", "@id":"5146823", "info":{"authors":{"author":[{"@pid":"52/7881","text":"Félix Gómez Mármol"},{"@pid":"p/GregorioMartinezPerez","text":"Gregorio Martínez Pérez"}]},"title":"TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MarmolP09","doi":"10.1109/ICC.2009.5199545","ee":"https://doi.org/10.1109/ICC.2009.5199545","url":"https://dblp.org/rec/conf/icc/MarmolP09"}, "url":"URL#5146823" }, { "@score":"1", "@id":"5146824", "info":{"authors":{"author":[{"@pid":"70/345","text":"Clarissa Cassales Marquezan"},{"@pid":"78/7495","text":"Jéferson Campos Nobre"},{"@pid":"52/4475","text":"Lisandro Zambenedetti Granville"},{"@pid":"44/1246","text":"Giorgio Nunzi"},{"@pid":"29/480","text":"Dominique Dudkowski"},{"@pid":"05/2754","text":"Marcus Brunner"}]},"title":"Distributed Reallocation Scheme for Virtual Network Resources.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MarquezanNGNDB09","doi":"10.1109/ICC.2009.5198934","ee":"https://doi.org/10.1109/ICC.2009.5198934","url":"https://dblp.org/rec/conf/icc/MarquezanNGNDB09"}, "url":"URL#5146824" }, { "@score":"1", "@id":"5146825", "info":{"authors":{"author":[{"@pid":"63/347","text":"Patrick Marsch"},{"@pid":"f/GFettweis","text":"Gerhard P. Fettweis"}]},"title":"On Uplink Network MIMO under a Constrained Backhaul and Imperfect Channel Knowledge.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MarschF09","doi":"10.1109/ICC.2009.5199272","ee":"https://doi.org/10.1109/ICC.2009.5199272","url":"https://dblp.org/rec/conf/icc/MarschF09"}, "url":"URL#5146825" }, { "@score":"1", "@id":"5146826", "info":{"authors":{"author":[{"@pid":"82/5581","text":"Christos Masouros"},{"@pid":"34/1858","text":"Emad Alsusa"}]},"title":"A Hybrid MC-CDMA Precoding Scheme Employing Code Hopping and Partial Beamforming.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MasourosA09","doi":"10.1109/ICC.2009.5198617","ee":"https://doi.org/10.1109/ICC.2009.5198617","url":"https://dblp.org/rec/conf/icc/MasourosA09"}, "url":"URL#5146826" }, { "@score":"1", "@id":"5146827", "info":{"authors":{"author":[{"@pid":"82/5581","text":"Christos Masouros"},{"@pid":"34/1858","text":"Emad Alsusa"}]},"title":"Selective Channel Inversion Precoding for the Downlink of MIMO Wireless Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MasourosA09a","doi":"10.1109/ICC.2009.5199447","ee":"https://doi.org/10.1109/ICC.2009.5199447","url":"https://dblp.org/rec/conf/icc/MasourosA09a"}, "url":"URL#5146827" }, { "@score":"1", "@id":"5146828", "info":{"authors":{"author":[{"@pid":"41/5646","text":"Javier Matamoros"},{"@pid":"26/6412","text":"Carles Antón-Haro"}]},"title":"To Sort or Not to Sort: Optimal Sensor Scheduling for Successive Compress-and-Estimate Encoding.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MatamorosA09","doi":"10.1109/ICC.2009.5199532","ee":"https://doi.org/10.1109/ICC.2009.5199532","url":"https://dblp.org/rec/conf/icc/MatamorosA09"}, "url":"URL#5146828" }, { "@score":"1", "@id":"5146829", "info":{"authors":{"author":[{"@pid":"51/5954","text":"Matthew R. McKay"},{"@pid":"07/3441","text":"Iain B. Collings"},{"@pid":"03/4183","text":"Antonia Maria Tulino"}]},"title":"Exploiting Connections Between MIMO MMSE Achievable Rate and MIMO Mutual Information.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/McKayCT09","doi":"10.1109/ICC.2009.5199016","ee":"https://doi.org/10.1109/ICC.2009.5199016","url":"https://dblp.org/rec/conf/icc/McKayCT09"}, "url":"URL#5146829" }, { "@score":"1", "@id":"5146830", "info":{"authors":{"author":[{"@pid":"23/5651","text":"César A. Medina"},{"@pid":"04/1093","text":"Tiago T. V. Vinhoza"},{"@pid":"34/5084","text":"Raimundo Sampaio Neto"}]},"title":"A Blind Channel Estimation Algorithm for Space-Time Coded MC-CDMA Receivers.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MedinaVN09","doi":"10.1109/ICC.2009.5198578","ee":"https://doi.org/10.1109/ICC.2009.5198578","url":"https://dblp.org/rec/conf/icc/MedinaVN09"}, "url":"URL#5146830" }, { "@score":"1", "@id":"5146831", "info":{"authors":{"author":[{"@pid":"98/736","text":"Omar Mehanna"},{"@pid":"164/8759","text":"Ahmed K. Sultan"},{"@pid":"89/614","text":"Hesham El Gamal"}]},"title":"Blind Cognitive MAC Protocols.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MehannaSG09","doi":"10.1109/ICC.2009.5198790","ee":"https://doi.org/10.1109/ICC.2009.5198790","url":"https://dblp.org/rec/conf/icc/MehannaSG09"}, "url":"URL#5146831" }, { "@score":"1", "@id":"5146832", "info":{"authors":{"author":[{"@pid":"23/6705","text":"Mehri Mehrjoo"},{"@pid":"99/5811","text":"Somayeh Moazeni"},{"@pid":"s/XueminShen","text":"Xuemin (Sherman) Shen"}]},"title":"An Interior Point Penalty Method for Utility Maximization Problems in OFDMA Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MehrjooMS09","doi":"10.1109/ICC.2009.5198735","ee":"https://doi.org/10.1109/ICC.2009.5198735","url":"https://dblp.org/rec/conf/icc/MehrjooMS09"}, "url":"URL#5146832" }, { "@score":"1", "@id":"5146833", "info":{"authors":{"author":[{"@pid":"38/7882","text":"Robert Melervey"},{"@pid":"181/2323-7","text":"Yan Sun 0007"},{"@pid":"l/TomLaPorta","text":"Thomas F. La Porta"}]},"title":"Multiple Backhaul Mobile Access Router Striping.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MelerveySP09","doi":"10.1109/ICC.2009.5199204","ee":"https://doi.org/10.1109/ICC.2009.5199204","url":"https://dblp.org/rec/conf/icc/MelerveySP09"}, "url":"URL#5146833" }, { "@score":"1", "@id":"5146834", "info":{"authors":{"author":[{"@pid":"18/7883","text":"Lehan Meng"},{"@pid":"a/ChadiAssi","text":"Chadi Assi"},{"@pid":"43/4474-1","text":"Martin Maier 0001"},{"@pid":"45/3525","text":"Ahmad R. Dhaini"}]},"title":"Resource Management in Stargate-Based Ethernet Passive Optical Networks (SG-EPONs).","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MengAMD09","doi":"10.1109/ICC.2009.5199414","ee":"https://doi.org/10.1109/ICC.2009.5199414","url":"https://dblp.org/rec/conf/icc/MengAMD09"}, "url":"URL#5146834" }, { "@score":"1", "@id":"5146835", "info":{"authors":{"author":[{"@pid":"13/7882","text":"Federico Menna"},{"@pid":"53/2961","text":"Renato Lo Cigno"},{"@pid":"05/4039","text":"Saverio Niccolini"},{"@pid":"38/1318","text":"Sandra Tartarelli"}]},"title":"Simulation of SPIT Filtering: Quantitative Evaluation of Parameter Tuning.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MennaCNT09","doi":"10.1109/ICC.2009.5199460","ee":"https://doi.org/10.1109/ICC.2009.5199460","url":"https://dblp.org/rec/conf/icc/MennaCNT09"}, "url":"URL#5146835" }, { "@score":"1", "@id":"5146836", "info":{"authors":{"author":[{"@pid":"19/5731","text":"Björn Mennenga"},{"@pid":"32/7881","text":"Andreas von Borany"},{"@pid":"f/GFettweis","text":"Gerhard P. Fettweis"}]},"title":"Complexity Reduced Soft-In Soft-Out Sphere Detection Based on Search Tuples.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MennengaBF09","doi":"10.1109/ICC.2009.5198839","ee":"https://doi.org/10.1109/ICC.2009.5198839","url":"https://dblp.org/rec/conf/icc/MennengaBF09"}, "url":"URL#5146836" }, { "@score":"1", "@id":"5146837", "info":{"authors":{"author":[{"@pid":"00/1121","text":"Christian Mensing"},{"@pid":"03/652","text":"Stephan Sand"},{"@pid":"66/2353","text":"Armin Dammann"},{"@pid":"34/5115","text":"Wolfgang Utschick"}]},"title":"Interference-Aware Location Estimation in Cellular OFDM Communications Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MensingSDU09","doi":"10.1109/ICC.2009.5199097","ee":"https://doi.org/10.1109/ICC.2009.5199097","url":"https://dblp.org/rec/conf/icc/MensingSDU09"}, "url":"URL#5146837" }, { "@score":"1", "@id":"5146838", "info":{"authors":{"author":[{"@pid":"87/5132","text":"Guowang Miao"},{"@pid":"20/4102","text":"Nageen Himayat"},{"@pid":"89/5914","text":"Ye (Geoffrey) Li"},{"@pid":"95/4903","text":"Ali Taha Koç"},{"@pid":"21/1589","text":"Shilpa Talwar"}]},"title":"Interference-Aware Energy-Efficient Power Optimization.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MiaoHLKT09","doi":"10.1109/ICC.2009.5199096","ee":"https://doi.org/10.1109/ICC.2009.5199096","url":"https://dblp.org/rec/conf/icc/MiaoHLKT09"}, "url":"URL#5146838" }, { "@score":"1", "@id":"5146839", "info":{"authors":{"author":[{"@pid":"87/5132","text":"Guowang Miao"},{"@pid":"20/4102","text":"Nageen Himayat"},{"@pid":"89/5914","text":"Ye (Geoffrey) Li"},{"@pid":"21/1589","text":"Shilpa Talwar"}]},"title":"Low-Complexity Energy-Efficient OFDMA.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MiaoHLT09","doi":"10.1109/ICC.2009.5199158","ee":"https://doi.org/10.1109/ICC.2009.5199158","url":"https://dblp.org/rec/conf/icc/MiaoHLT09"}, "url":"URL#5146839" }, { "@score":"1", "@id":"5146840", "info":{"authors":{"author":[{"@pid":"58/328","text":"Chiara Mingardi"},{"@pid":"05/2754","text":"Marcus Brunner"}]},"title":"IPTV Quality of Service Management in Home Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MingardiB09","doi":"10.1109/ICC.2009.5199103","ee":"https://doi.org/10.1109/ICC.2009.5199103","url":"https://dblp.org/rec/conf/icc/MingardiB09"}, "url":"URL#5146840" }, { "@score":"1", "@id":"5146841", "info":{"authors":{"author":[{"@pid":"36/1023","text":"Sudip Misra"},{"@pid":"52/6933","text":"Sanjay K. Dhurandher"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"},{"@pid":"86/7883","text":"Inderpreet Singh"},{"@pid":"99/7880","text":"Bhuvnesh Bhambhani"},{"@pid":"35/7881","text":"Raghu Agarwal"}]},"title":"On Increasing Information Availability in Gnutella-Like Peer-to-Peer Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MisraDOSBA09","doi":"10.1109/ICC.2009.5199241","ee":"https://doi.org/10.1109/ICC.2009.5199241","url":"https://dblp.org/rec/conf/icc/MisraDOSBA09"}, "url":"URL#5146841" }, { "@score":"1", "@id":"5146842", "info":{"authors":{"author":[{"@pid":"36/1023","text":"Sudip Misra"},{"@pid":"52/6933","text":"Sanjay K. Dhurandher"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"},{"@pid":"46/7883","text":"Karan Verma"},{"@pid":"31/7884","text":"Pushkar Gupta"}]},"title":"Using Ant-Like Agents for Fault-Tolerant Routing in Mobile Ad-Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MisraDOVG09","doi":"10.1109/ICC.2009.5199555","ee":"https://doi.org/10.1109/ICC.2009.5199555","url":"https://dblp.org/rec/conf/icc/MisraDOVG09"}, "url":"URL#5146842" }, { "@score":"1", "@id":"5146843", "info":{"authors":{"author":[{"@pid":"79/2206","text":"Satyajayant Misra"},{"@pid":"14/2662","text":"Mayank Verma"},{"@pid":"36/4573","text":"Dijiang Huang"},{"@pid":"64/4394","text":"Guoliang Xue"}]},"title":"SEAS: A Secure and Efficient Anonymity Scheme for Low-Cost RFID Tags.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MisraVHX09","doi":"10.1109/ICC.2009.5199437","ee":"https://doi.org/10.1109/ICC.2009.5199437","url":"https://dblp.org/rec/conf/icc/MisraVHX09"}, "url":"URL#5146843" }, { "@score":"1", "@id":"5146844", "info":{"authors":{"author":{"@pid":"62/5386","text":"Joseph Mitola III"}},"title":"Cognitive Radio Policy Languages.","venue":"ICC","pages":"1-4","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Mitola09","doi":"10.1109/ICC.2009.5198831","ee":"https://doi.org/10.1109/ICC.2009.5198831","url":"https://dblp.org/rec/conf/icc/Mitola09"}, "url":"URL#5146844" }, { "@score":"1", "@id":"5146845", "info":{"authors":{"author":[{"@pid":"18/6467","text":"Thomas Mittelholzer"},{"@pid":"31/7847","text":"Michele Franceschini"},{"@pid":"40/2861","text":"Luis Alfonso Lastras-Montaño"},{"@pid":"29/2561","text":"Ibrahim M. Elfadel"},{"@pid":"88/215","text":"Mayank Sharma"}]},"title":"Rewritable Channels With Data-Dependent Noise.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MittelholzerFLES09","doi":"10.1109/ICC.2009.5199420","ee":"https://doi.org/10.1109/ICC.2009.5199420","url":"https://dblp.org/rec/conf/icc/MittelholzerFLES09"}, "url":"URL#5146845" }, { "@score":"1", "@id":"5146846", "info":{"authors":{"author":[{"@pid":"64/2352","text":"Ronghong Mo"},{"@pid":"80/7880","text":"Ser Wah Oh"},{"@pid":"65/4787","text":"Yonghong Zeng"}]},"title":"Time and Frequency Synchronization for Power Line OFDM Systems with Colored Noise.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MoOZ09","doi":"10.1109/ICC.2009.5199531","ee":"https://doi.org/10.1109/ICC.2009.5199531","url":"https://dblp.org/rec/conf/icc/MoOZ09"}, "url":"URL#5146846" }, { "@score":"1", "@id":"5146847", "info":{"authors":{"author":[{"@pid":"33/2194","text":"Tinoosh Mohsenin"},{"@pid":"70/7019","text":"Dean Truong"},{"@pid":"22/1108","text":"Bevan M. Baas"}]},"title":"An Improved Split-Row Threshold Decoding Algorithm for LDPC Codes.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MohseninTB09","doi":"10.1109/ICC.2009.5198733","ee":"https://doi.org/10.1109/ICC.2009.5198733","url":"https://dblp.org/rec/conf/icc/MohseninTB09"}, "url":"URL#5146847" }, { "@score":"1", "@id":"5146848", "info":{"authors":{"author":[{"@pid":"37/5849","text":"Sebastian Möller 0001"},{"@pid":"30/3619","text":"Marcel Wältermann"},{"@pid":"23/3758","text":"Blazej Lewcio"},{"@pid":"46/4327","text":"Niklas Kirschnick"},{"@pid":"34/2368","text":"Pablo Vidales"}]},"title":"Speech Quality While Roaming in Next Generation Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MollerWLKV09","doi":"10.1109/ICC.2009.5199482","ee":"https://doi.org/10.1109/ICC.2009.5199482","url":"https://dblp.org/rec/conf/icc/MollerWLKV09"}, "url":"URL#5146848" }, { "@score":"1", "@id":"5146849", "info":{"authors":{"author":[{"@pid":"43/2712","text":"Bayarpurev Mongol"},{"@pid":"29/3432","text":"Takaya Yamazato"},{"@pid":"72/5453","text":"Masaaki Katayama"}]},"title":"Channel Estimation and Tracking Schemes for the Pulse-Shaping OFDM Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MongolYK09","doi":"10.1109/ICC.2009.5198817","ee":"https://doi.org/10.1109/ICC.2009.5198817","url":"https://dblp.org/rec/conf/icc/MongolYK09"}, "url":"URL#5146849" }, { "@score":"1", "@id":"5146850", "info":{"authors":{"author":[{"@pid":"26/7882","text":"Demetris Monoyios"},{"@pid":"96/6776","text":"Kyriakos Vlachos"},{"@pid":"24/7881","text":"Marianna Angelou"},{"@pid":"56/1654","text":"Ioannis Tomkos"}]},"title":"On the Use of Multi-Objective Optimization Algorithms for Solving the Impairment Aware-RWA Problem.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MonoyiosVAT09","doi":"10.1109/ICC.2009.5199271","ee":"https://doi.org/10.1109/ICC.2009.5199271","url":"https://dblp.org/rec/conf/icc/MonoyiosVAT09"}, "url":"URL#5146850" }, { "@score":"1", "@id":"5146851", "info":{"authors":{"author":[{"@pid":"92/7880","text":"Marcio Monteiro"},{"@pid":"72/5929","text":"Neiva Lindqvist"},{"@pid":"44/1366","text":"Aldebaro Klautau"}]},"title":"Spectrum Balancing Algorithms for Power Minimization in DSL Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MonteiroLK09","doi":"10.1109/ICC.2009.5199478","ee":"https://doi.org/10.1109/ICC.2009.5199478","url":"https://dblp.org/rec/conf/icc/MonteiroLK09"}, "url":"URL#5146851" }, { "@score":"1", "@id":"5146852", "info":{"authors":{"author":[{"@pid":"60/6813","text":"Nektarios Moraitis"},{"@pid":"01/7884","text":"Argyris Kyriazos"},{"@pid":"12/1224","text":"Philip Constantinou"},{"@pid":"94/2313","text":"Demosthenes Vouyioukas"}]},"title":"Capacity Evaluation of a Land Mobile Satellite System Utilizing Multiple Element Antennas.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MoraitisKCV09","doi":"10.1109/ICC.2009.5305937","ee":"https://doi.org/10.1109/ICC.2009.5305937","url":"https://dblp.org/rec/conf/icc/MoraitisKCV09"}, "url":"URL#5146852" }, { "@score":"1", "@id":"5146853", "info":{"authors":{"author":[{"@pid":"64/1933","text":"Mikaël Morelle"},{"@pid":"30/5586","text":"Stephanie Sahuguede"},{"@pid":"24/3499","text":"Anne Julien-Vergonjanne"},{"@pid":"06/6278","text":"Jean-Pierre Cances"}]},"title":"Theoretical Performance of Multi-Weight Spreading Codes for Multimedia Optical Access Network.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MorelleSJC09","doi":"10.1109/ICC.2009.5199521","ee":"https://doi.org/10.1109/ICC.2009.5199521","url":"https://dblp.org/rec/conf/icc/MorelleSJC09"}, "url":"URL#5146853" }, { "@score":"1", "@id":"5146854", "info":{"authors":{"author":[{"@pid":"09/4100","text":"Lorenzo Mucchi"},{"@pid":"63/6983","text":"Luca Simone Ronga"},{"@pid":"65/5503","text":"Enrico Del Re"}]},"title":"Design and Implementation of Physical Layer Private Key Setting for Wireless Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MucchiRR09","doi":"10.1109/ICC.2009.5198900","ee":"https://doi.org/10.1109/ICC.2009.5198900","url":"https://dblp.org/rec/conf/icc/MucchiRR09"}, "url":"URL#5146854" }, { "@score":"1", "@id":"5146855", "info":{"authors":{"author":[{"@pid":"14/7881","text":"Sami Muhaidat"},{"@pid":"81/886","text":"James K. Cavers"},{"@pid":"49/1923","text":"Paul Ho"}]},"title":"Selection Cooperation with Transparent Amplify-and-Forward Relaying in MIMO Relay Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MuhaidatCH09","doi":"10.1109/ICC.2009.5199446","ee":"https://doi.org/10.1109/ICC.2009.5199446","url":"https://dblp.org/rec/conf/icc/MuhaidatCH09"}, "url":"URL#5146855" }, { "@score":"1", "@id":"5146856", "info":{"authors":{"author":[{"@pid":"38/4335-1","text":"Andreas Müller 0001"},{"@pid":"80/2998","text":"Joachim Speidel"}]},"title":"Achieving Exponential Diversity in Wireless Multihop Systems with Regenerative Relays.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MullerS09","doi":"10.1109/ICC.2009.5198691","ee":"https://doi.org/10.1109/ICC.2009.5198691","url":"https://dblp.org/rec/conf/icc/MullerS09"}, "url":"URL#5146856" }, { "@score":"1", "@id":"5146857", "info":{"authors":{"author":[{"@pid":"91/2493","text":"Robert Müllner"},{"@pid":"69/4299","text":"Carsten F. Ball"},{"@pid":"46/7043","text":"Kolio Ivanov"},{"@pid":"61/7083","text":"Johann Lienhart"},{"@pid":"75/7082","text":"Peter Hric"}]},"title":"Contrasting Open-Loop and Closed-Loop Power Control Performance in UTRAN LTE Uplink by UE Trace Analysis.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MullnerBILH09","doi":"10.1109/ICC.2009.5198853","ee":"https://doi.org/10.1109/ICC.2009.5198853","url":"https://dblp.org/rec/conf/icc/MullnerBILH09"}, "url":"URL#5146857" }, { "@score":"1", "@id":"5146858", "info":{"authors":{"author":[{"@pid":"56/3266","text":"Sudheendra Murthy"},{"@pid":"48/7881","text":"Prasad Hegde"},{"@pid":"s/ArunabhaSen","text":"Arunabha Sen"}]},"title":"Design of a Delay-Based Routing Protocol for Multi-Rate Multi-Hop Mobile Ad Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MurthyHS09","doi":"10.1109/ICC.2009.5198902","ee":"https://doi.org/10.1109/ICC.2009.5198902","url":"https://dblp.org/rec/conf/icc/MurthyHS09"}, "url":"URL#5146858" }, { "@score":"1", "@id":"5146859", "info":{"authors":{"author":[{"@pid":"41/3870","text":"Leila Musavian"},{"@pid":"77/1439","text":"Sonia Aïssa"}]},"title":"Adaptive Modulation in Spectrum-Sharing Systems with Delay Constraints.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MusavianA09","doi":"10.1109/ICC.2009.5198704","ee":"https://doi.org/10.1109/ICC.2009.5198704","url":"https://dblp.org/rec/conf/icc/MusavianA09"}, "url":"URL#5146859" }, { "@score":"1", "@id":"5146860", "info":{"authors":{"author":[{"@pid":"19/7882","text":"Mohamed Musbah"},{"@pid":"65/2899","text":"Xu Zhu"}]},"title":"Low-Complexity Equalization Based on Least Squares Support Vector Classifiers for DS-UWB Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MusbahZ09","doi":"10.1109/ICC.2009.5199159","ee":"https://doi.org/10.1109/ICC.2009.5199159","url":"https://dblp.org/rec/conf/icc/MusbahZ09"}, "url":"URL#5146860" }, { "@score":"1", "@id":"5146861", "info":{"authors":{"author":[{"@pid":"52/3186","text":"Luca Muscariello"},{"@pid":"03/3645","text":"Diego Perino"},{"@pid":"14/3340","text":"Dario Rossi 0001"}]},"title":"Do Next Generation Networks Need Path Diversity?","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MuscarielloPR09","doi":"10.1109/ICC.2009.5198944","ee":"https://doi.org/10.1109/ICC.2009.5198944","url":"https://dblp.org/rec/conf/icc/MuscarielloPR09"}, "url":"URL#5146861" }, { "@score":"1", "@id":"5146862", "info":{"authors":{"author":[{"@pid":"05/5594","text":"Mubashar Mushtaq"},{"@pid":"18/4550","text":"Toufik Ahmed"}]},"title":"End-to-End QoS Provisioning for Real-Time Video Streaming over SP-Driven P2P Networks Using Admission Control.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/MushtaqA09","doi":"10.1109/ICC.2009.5198986","ee":"https://doi.org/10.1109/ICC.2009.5198986","url":"https://dblp.org/rec/conf/icc/MushtaqA09"}, "url":"URL#5146862" }, { "@score":"1", "@id":"5146863", "info":{"authors":{"author":[{"@pid":"02/2072","text":"Pedro Henrique Juliano Nardelli"},{"@pid":"64/2068","text":"Giuseppe Thadeu Freitas de Abreu"},{"@pid":"77/4652","text":"Paulo Cardieri"}]},"title":"Multi-Hop Aggregate Information Efficiency in Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NardelliAC09","doi":"10.1109/ICC.2009.5199200","ee":"https://doi.org/10.1109/ICC.2009.5199200","url":"https://dblp.org/rec/conf/icc/NardelliAC09"}, "url":"URL#5146863" }, { "@score":"1", "@id":"5146864", "info":{"authors":{"author":[{"@pid":"48/1460","text":"Amir Nasri"},{"@pid":"23/6764","text":"Ali Nezampour"},{"@pid":"95/2265","text":"Robert Schober"}]},"title":"Adaptive Coherent Lp-Norm Combining.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NasriNS09","doi":"10.1109/ICC.2009.5198698","ee":"https://doi.org/10.1109/ICC.2009.5198698","url":"https://dblp.org/rec/conf/icc/NasriNS09"}, "url":"URL#5146864" }, { "@score":"1", "@id":"5146865", "info":{"authors":{"author":[{"@pid":"52/665","text":"Mohamed Nassar 0001"},{"@pid":"05/6228","text":"Radu State"},{"@pid":"f/OlivierFestor","text":"Olivier Festor"}]},"title":"VoIP Malware: Attack Tool & Attack Scenarios.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NassarSF09","doi":"10.1109/ICC.2009.5199570","ee":"https://doi.org/10.1109/ICC.2009.5199570","url":"https://dblp.org/rec/conf/icc/NassarSF09"}, "url":"URL#5146865" }, { "@score":"1", "@id":"5146866", "info":{"authors":{"author":[{"@pid":"29/7881","text":"Eugène David Ngangue Ndih"},{"@pid":"51/1381","text":"Nadia Khaled"},{"@pid":"d/GDeMicheli","text":"Giovanni De Micheli"}]},"title":"An Analytical Model for the Contention Access Period of the Slotted IEEE 802.15.4 with Service Differentiation.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NdihKM09","doi":"10.1109/ICC.2009.5198719","ee":"https://doi.org/10.1109/ICC.2009.5198719","url":"https://dblp.org/rec/conf/icc/NdihKM09"}, "url":"URL#5146866" }, { "@score":"1", "@id":"5146867", "info":{"authors":{"author":[{"@pid":"86/7821","text":"Mehran Nekuii"},{"@pid":"43/368","text":"Timothy N. Davidson"}]},"title":"A Semidefinite Relaxation Approach to Efficient Soft Demodulation of MIMO 16-QAM.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NekuiiD09","doi":"10.1109/ICC.2009.5198668","ee":"https://doi.org/10.1109/ICC.2009.5198668","url":"https://dblp.org/rec/conf/icc/NekuiiD09"}, "url":"URL#5146867" }, { "@score":"1", "@id":"5146868", "info":{"authors":{"author":[{"@pid":"20/7881","text":"Andrew Newell"},{"@pid":"88/755","text":"Kemal Akkaya"}]},"title":"Self-Actuation of Camera Sensors for Redundant Data Elimination in Wireless Multimedia Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NewellA09","doi":"10.1109/ICC.2009.5199448","ee":"https://doi.org/10.1109/ICC.2009.5199448","url":"https://dblp.org/rec/conf/icc/NewellA09"}, "url":"URL#5146868" }, { "@score":"1", "@id":"5146869", "info":{"authors":{"author":[{"@pid":"25/6170","text":"Soon Xin Ng"},{"@pid":"59/6828-1","text":"Yonghui Li 0001"},{"@pid":"92/5955","text":"Lajos Hanzo"}]},"title":"Distributed Turbo Trellis Coded Modulation for Cooperative Communications.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NgLH09","doi":"10.1109/ICC.2009.5198938","ee":"https://doi.org/10.1109/ICC.2009.5198938","url":"https://dblp.org/rec/conf/icc/NgLH09"}, "url":"URL#5146869" }, { "@score":"1", "@id":"5146870", "info":{"authors":{"author":[{"@pid":"44/6577","text":"Chris T. K. Ng"},{"@pid":"m/MurielMedard","text":"Muriel Médard"},{"@pid":"35/2875","text":"Asuman E. Ozdaglar"}]},"title":"Completion Time Minimization and Robust Power Control in Wireless Packet Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NgMO09","doi":"10.1109/ICC.2009.5198837","ee":"https://doi.org/10.1109/ICC.2009.5198837","url":"https://dblp.org/rec/conf/icc/NgMO09"}, "url":"URL#5146870" }, { "@score":"1", "@id":"5146871", "info":{"authors":{"author":[{"@pid":"90/7883","text":"Quoc-Tuong Ngo"},{"@pid":"28/5765","text":"Olivier Berder"},{"@pid":"55/3953","text":"Baptiste Vrigneau"},{"@pid":"28/4014","text":"Olivier Sentieys"}]},"title":"Minimum Distance Based Precoder for MIMO-OFDM Systems Using a 16-QAM Modulation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NgoBVS09","doi":"10.1109/ICC.2009.5199182","ee":"https://doi.org/10.1109/ICC.2009.5199182","url":"https://dblp.org/rec/conf/icc/NgoBVS09"}, "url":"URL#5146871" }, { "@score":"1", "@id":"5146872", "info":{"authors":{"author":[{"@pid":"91/5348","text":"Hung Nguyen-Le"},{"@pid":"41/2926","text":"Tho Le-Ngoc"}]},"title":"Joint Synchronization and Channel Estimation for OFDM Transmissions over Doubly Selective Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Nguyen-LeL09","doi":"10.1109/ICC.2009.5199122","ee":"https://doi.org/10.1109/ICC.2009.5199122","url":"https://dblp.org/rec/conf/icc/Nguyen-LeL09"}, "url":"URL#5146872" }, { "@score":"1", "@id":"5146873", "info":{"authors":{"author":[{"@pid":"97/6879","text":"Kien C. Nguyen"},{"@pid":"a/TansuAlpcan","text":"Tansu Alpcan"},{"@pid":"b/TamerBasar","text":"Tamer Basar"}]},"title":"Security Games with Incomplete Information.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NguyenAB09","doi":"10.1109/ICC.2009.5199443","ee":"https://doi.org/10.1109/ICC.2009.5199443","url":"https://dblp.org/rec/conf/icc/NguyenAB09"}, "url":"URL#5146873" }, { "@score":"1", "@id":"5146874", "info":{"authors":{"author":[{"@pid":"25/3656","text":"Giang Hoang Nguyen"},{"@pid":"86/7882","text":"Vincent Dobremez"},{"@pid":"02/7881","text":"Béatrice Cabon"},{"@pid":"48/7884","text":"Yannis Le Guennec"}]},"title":"Optical Techniques for Up-Conversion of MB-OFDM Signals in 60 Ghz Band Using Fiber Bragg Grating.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NguyenDCG09","doi":"10.1109/ICC.2009.5199276","ee":"https://doi.org/10.1109/ICC.2009.5199276","url":"https://dblp.org/rec/conf/icc/NguyenDCG09"}, "url":"URL#5146874" }, { "@score":"1", "@id":"5146875", "info":{"authors":{"author":[{"@pid":"18/1411-1","text":"Trung Thanh Nguyen 0001"},{"@pid":"21/788","text":"Lutz H.-J. Lampe"}]},"title":"Coded Pulse-Position Modulation for Free-Space Optical Communications.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NguyenL09","doi":"10.1109/ICC.2009.5198829","ee":"https://doi.org/10.1109/ICC.2009.5198829","url":"https://dblp.org/rec/conf/icc/NguyenL09"}, "url":"URL#5146875" }, { "@score":"1", "@id":"5146876", "info":{"authors":{"author":[{"@pid":"64/6114","text":"Duy H. N. Nguyen"},{"@pid":"55/1768-1","text":"Ha H. Nguyen 0001"}]},"title":"Channel Estimation and Performance of Mismatched Decoding in Wireless Relay Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NguyenN09","doi":"10.1109/ICC.2009.5198816","ee":"https://doi.org/10.1109/ICC.2009.5198816","url":"https://dblp.org/rec/conf/icc/NguyenN09"}, "url":"URL#5146876" }, { "@score":"1", "@id":"5146877", "info":{"authors":{"author":[{"@pid":"64/6114","text":"Duy H. N. Nguyen"},{"@pid":"55/1768-1","text":"Ha H. Nguyen 0001"},{"@pid":"51/4580","text":"Hoang Duong Tuan"}]},"title":"Distributed Beamforming in Relay-Assisted Multiuser Communications.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NguyenNT09","doi":"10.1109/ICC.2009.5198922","ee":"https://doi.org/10.1109/ICC.2009.5198922","url":"https://dblp.org/rec/conf/icc/NguyenNT09"}, "url":"URL#5146877" }, { "@score":"1", "@id":"5146878", "info":{"authors":{"author":[{"@pid":"64/6114","text":"Duy H. N. Nguyen"},{"@pid":"55/1768-1","text":"Ha H. Nguyen 0001"},{"@pid":"51/4580","text":"Hoang Duong Tuan"}]},"title":"A Novel Power Allocation Scheme for Distributed Space-Time Coding.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NguyenNT09a","doi":"10.1109/ICC.2009.5198651","ee":"https://doi.org/10.1109/ICC.2009.5198651","url":"https://dblp.org/rec/conf/icc/NguyenNT09a"}, "url":"URL#5146878" }, { "@score":"1", "@id":"5146879", "info":{"authors":{"author":[{"@pid":"31/2597","text":"Wei Ni"},{"@pid":"10/5209","text":"Haifeng Wang"},{"@pid":"04/7884","text":"Zhenhong Li"}]},"title":"Coordinated Transmission in Distributed Ad Hoc Peer-To-Peer (P2P) Communications.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NiWL09","doi":"10.1109/ICC.2009.5305959","ee":"https://doi.org/10.1109/ICC.2009.5305959","url":"https://dblp.org/rec/conf/icc/NiWL09"}, "url":"URL#5146879" }, { "@score":"1", "@id":"5146880", "info":{"authors":{"author":[{"@pid":"64/247","text":"Chun Nie"},{"@pid":"84/3210-1","text":"Pei Liu 0001"},{"@pid":"84/4337","text":"Thanasis Korakis"},{"@pid":"15/5237","text":"Elza Erkip"},{"@pid":"87/3965","text":"Shivendra S. Panwar"}]},"title":"CoopMAX: A Cooperative MAC with Randomized Distributed Space-Time Coding for an IEEE 802.16 Network.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NieLKEP09","doi":"10.1109/ICC.2009.5198865","ee":"https://doi.org/10.1109/ICC.2009.5198865","url":"https://dblp.org/rec/conf/icc/NieLKEP09"}, "url":"URL#5146880" }, { "@score":"1", "@id":"5146881", "info":{"authors":{"author":[{"@pid":"84/7881","text":"Pin Nie"},{"@pid":"39/5238","text":"Juha-Matti Tapio"},{"@pid":"66/5629","text":"Sasu Tarkoma"},{"@pid":"23/6758","text":"Jani Heikkinen"}]},"title":"Flexible Single Sign-On for SIP: Bridging the Identity Chasm.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NieTTH09","doi":"10.1109/ICC.2009.5199034","ee":"https://doi.org/10.1109/ICC.2009.5199034","url":"https://dblp.org/rec/conf/icc/NieTTH09"}, "url":"URL#5146881" }, { "@score":"1", "@id":"5146882", "info":{"authors":{"author":[{"@pid":"12/7881","text":"Haishi Ning"},{"@pid":"11/916","text":"Cong Ling 0001"},{"@pid":"04/2707","text":"Kin K. Leung"}]},"title":"Near-Optimal Relaying Strategy for Cooperative Broadcast Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NingLL09","doi":"10.1109/ICC.2009.5199215","ee":"https://doi.org/10.1109/ICC.2009.5199215","url":"https://dblp.org/rec/conf/icc/NingLL09"}, "url":"URL#5146882" }, { "@score":"1", "@id":"5146883", "info":{"authors":{"author":[{"@pid":"27/7882","text":"Mingbo Niu"},{"@pid":"11/1709","text":"Julian Cheng"},{"@pid":"81/7548","text":"Jonathan F. Holzman"},{"@pid":"19/7884","text":"Liz McPhail"}]},"title":"Performance Analysis of Coherent Free Space Optical Communication Systems with K-Distributed Turbulence.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NiuCHM09","doi":"10.1109/ICC.2009.5199306","ee":"https://doi.org/10.1109/ICC.2009.5199306","url":"https://dblp.org/rec/conf/icc/NiuCHM09"}, "url":"URL#5146883" }, { "@score":"1", "@id":"5146884", "info":{"authors":{"author":[{"@pid":"76/440","text":"Dusit Niyato"},{"@pid":"45/1224","text":"Ekram Hossain 0001"},{"@pid":"86/1369","text":"Dong In Kim"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"Joint Optimization of Placement and Bandwidth Reservation for Relays in IEEE 802.16j Mobile Multihop Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NiyatoHKH09","doi":"10.1109/ICC.2009.5199116","ee":"https://doi.org/10.1109/ICC.2009.5199116","url":"https://dblp.org/rec/conf/icc/NiyatoHKH09"}, "url":"URL#5146884" }, { "@score":"1", "@id":"5146885", "info":{"authors":{"author":[{"@pid":"39/1898","text":"Jarno Nousiainen"},{"@pid":"45/159","text":"Pasi E. Lassila"}]},"title":"Approximating Maximum Directed Flow in a Large Wireless Network.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NousiainenL09","doi":"10.1109/ICC.2009.5198759","ee":"https://doi.org/10.1109/ICC.2009.5198759","url":"https://dblp.org/rec/conf/icc/NousiainenL09"}, "url":"URL#5146885" }, { "@score":"1", "@id":"5146886", "info":{"authors":{"author":[{"@pid":"78/6014","text":"Jimmy Nsenga"},{"@pid":"07/3404","text":"Wim Van Thillo"},{"@pid":"87/1391","text":"François Horlin"},{"@pid":"05/3174","text":"Valéry Ramon"},{"@pid":"29/1532","text":"André Bourdoux"},{"@pid":"55/5766","text":"Rudy Lauwereins"}]},"title":"Joint Transmit and Receive Analog Beamforming in 60 GHz MIMO Multipath Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/NsengaTHRBL09","doi":"10.1109/ICC.2009.5199125","ee":"https://doi.org/10.1109/ICC.2009.5199125","url":"https://dblp.org/rec/conf/icc/NsengaTHRBL09"}, "url":"URL#5146886" }, { "@score":"1", "@id":"5146887", "info":{"authors":{"author":[{"@pid":"16/7882","text":"Niamh O'Mahony"},{"@pid":"56/7881","text":"Cillian O'Driscoll"},{"@pid":"41/3076","text":"Colin C. Murphy"}]},"title":"Performance of Sequential Probability Ratio Test for GPS Acquisition.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OMahonyOM09","doi":"10.1109/ICC.2009.5199333","ee":"https://doi.org/10.1109/ICC.2009.5199333","url":"https://dblp.org/rec/conf/icc/OMahonyOM09"}, "url":"URL#5146887" }, { "@score":"1", "@id":"5146888", "info":{"authors":{"author":[{"@pid":"99/7699","text":"Olusegun O. Odejide"},{"@pid":"42/2246","text":"Cajetan M. Akujuobi"},{"@pid":"53/4335","text":"Annamalai Annamalai"},{"@pid":"12/5439","text":"Gerald L. Fudge"}]},"title":"Application of Analytic Wavelet Transform for Signal Detection in Nyquist Folding Analog-to-Information Receiver.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OdejideAAF09","doi":"10.1109/ICC.2009.5198754","ee":"https://doi.org/10.1109/ICC.2009.5198754","url":"https://dblp.org/rec/conf/icc/OdejideAAF09"}, "url":"URL#5146888" }, { "@score":"1", "@id":"5146889", "info":{"authors":{"author":[{"@pid":"27/7884","text":"Simon Odou"},{"@pid":"05/3990-1","text":"Steven Martin 0001"},{"@pid":"97/3431","text":"Khaldoun Al Agha"}]},"title":"Idle Channel Time Estimation in Multi-Hop Wireless Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OdouMA09","doi":"10.1109/ICC.2009.5199063","ee":"https://doi.org/10.1109/ICC.2009.5199063","url":"https://dblp.org/rec/conf/icc/OdouMA09"}, "url":"URL#5146889" }, { "@score":"1", "@id":"5146890", "info":{"authors":{"author":[{"@pid":"80/3329","text":"Tobias J. Oechtering"},{"@pid":"90/5247","text":"Rafael F. Wyrembelski"},{"@pid":"39/3615","text":"Holger Boche"}]},"title":"On the Optimal Transmission for the MIMO Bidirectional Broadcast Channel.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OechteringWB09","doi":"10.1109/ICC.2009.5199259","ee":"https://doi.org/10.1109/ICC.2009.5199259","url":"https://dblp.org/rec/conf/icc/OechteringWB09"}, "url":"URL#5146890" }, { "@score":"1", "@id":"5146891", "info":{"authors":{"author":[{"@pid":"63/4488","text":"Eckhard Ohlmer"},{"@pid":"f/GFettweis","text":"Gerhard P. Fettweis"}]},"title":"Link Adaptation in Linearly Precoded Closed-Loop MIMO-OFDM Systems with Linear Receivers.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OhlmerF09","doi":"10.1109/ICC.2009.5199138","ee":"https://doi.org/10.1109/ICC.2009.5199138","url":"https://dblp.org/rec/conf/icc/OhlmerF09"}, "url":"URL#5146891" }, { "@score":"1", "@id":"5146892", "info":{"authors":{"author":[{"@pid":"51/6801","text":"Georgios Oikonomou"},{"@pid":"89/6100","text":"Jelena Mirkovic"}]},"title":"Modeling Human Behavior for Defense Against Flash-Crowd Attacks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OikonomouM09","doi":"10.1109/ICC.2009.5199191","ee":"https://doi.org/10.1109/ICC.2009.5199191","url":"https://dblp.org/rec/conf/icc/OikonomouM09"}, "url":"URL#5146892" }, { "@score":"1", "@id":"5146893", "info":{"authors":{"author":[{"@pid":"39/4168","text":"Anand Oka"},{"@pid":"21/788","text":"Lutz H.-J. Lampe"}]},"title":"Distributed Scalable Multi-Target Tracking with a Wireless Sensor Network.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OkaL09","doi":"10.1109/ICC.2009.5198935","ee":"https://doi.org/10.1109/ICC.2009.5198935","url":"https://dblp.org/rec/conf/icc/OkaL09"}, "url":"URL#5146893" }, { "@score":"1", "@id":"5146894", "info":{"authors":{"author":[{"@pid":"72/1700","text":"Eiji Oki"},{"@pid":"20/7739","text":"Ayako Iwaki"},{"@pid":"59/4715","text":"Akeo Masuda"},{"@pid":"06/3599","text":"Kohei Shiomoto"}]},"title":"Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OkiIMS09","doi":"10.1109/ICC.2009.5198976","ee":"https://doi.org/10.1109/ICC.2009.5198976","url":"https://dblp.org/rec/conf/icc/OkiIMS09"}, "url":"URL#5146894" }, { "@score":"1", "@id":"5146895", "info":{"authors":{"author":[{"@pid":"84/4142","text":"Wladek Olesinski"},{"@pid":"46/4152","text":"Hans Eberle"},{"@pid":"49/2203","text":"Nils Gura"}]},"title":"Scalable Alternatives to Virtual Output Queuing.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OlesinskiEG09","doi":"10.1109/ICC.2009.5199434","ee":"https://doi.org/10.1109/ICC.2009.5199434","url":"https://dblp.org/rec/conf/icc/OlesinskiEG09"}, "url":"URL#5146895" }, { "@score":"1", "@id":"5146896", "info":{"authors":{"author":[{"@pid":"26/2707","text":"Alina Olteanu"},{"@pid":"181/1848-1","text":"Yang Xiao 0001"}]},"title":"Fragmentation and AES Encryption Overhead in Very High-Speed Wireless LANs.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OlteanuX09","doi":"10.1109/ICC.2009.5199040","ee":"https://doi.org/10.1109/ICC.2009.5199040","url":"https://dblp.org/rec/conf/icc/OlteanuX09"}, "url":"URL#5146896" }, { "@score":"1", "@id":"5146897", "info":{"authors":{"author":[{"@pid":"26/2707","text":"Alina Olteanu"},{"@pid":"181/1848-1","text":"Yang Xiao 0001"},{"@pid":"w/KuiWu","text":"Kui Wu 0001"},{"@pid":"22/5535","text":"Xiaojiang Du"}]},"title":"An Optimal Sensor Network for Intrusion Detection.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OlteanuXWD09","doi":"10.1109/ICC.2009.5198738","ee":"https://doi.org/10.1109/ICC.2009.5198738","url":"https://dblp.org/rec/conf/icc/OlteanuXWD09"}, "url":"URL#5146897" }, { "@score":"1", "@id":"5146898", "info":{"authors":{"author":[{"@pid":"86/7881","text":"Mohammad Omer"},{"@pid":"86/2423","text":"Masoud Sajadieh"},{"@pid":"80/4572","text":"J. Stevenson Kenney"}]},"title":"A Fast Converging Adaptive Pre-Distorter for Multi-Carrier Transmitters.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OmerSK09","doi":"10.1109/ICC.2009.5198600","ee":"https://doi.org/10.1109/ICC.2009.5198600","url":"https://dblp.org/rec/conf/icc/OmerSK09"}, "url":"URL#5146898" }, { "@score":"1", "@id":"5146899", "info":{"authors":{"author":[{"@pid":"42/5523","text":"Diane Prisca Onguetou"},{"@pid":"g/WayneDGrover","text":"Wayne D. Grover"}]},"title":"Solution of a 200-Node p-Cycle Network Design Problem with GA-Based Pre-Selection of Candidate Structures.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OnguetouG09","doi":"10.1109/ICC.2009.5199466","ee":"https://doi.org/10.1109/ICC.2009.5199466","url":"https://dblp.org/rec/conf/icc/OnguetouG09"}, "url":"URL#5146899" }, { "@score":"1", "@id":"5146900", "info":{"authors":{"author":[{"@pid":"28/7884","text":"Wendy Ooms"},{"@pid":"50/7881","text":"Fabian A. Walraven"},{"@pid":"25/7884","text":"Martin van der Werff"}]},"title":"Integration of IMS and DVB-RCS for Interactive Content Delivery.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OomsWW09","doi":"10.1109/ICC.2009.5199086","ee":"https://doi.org/10.1109/ICC.2009.5199086","url":"https://dblp.org/rec/conf/icc/OomsWW09"}, "url":"URL#5146900" }, { "@score":"1", "@id":"5146901", "info":{"authors":{"author":[{"@pid":"73/1386","text":"Yahya E. Osais"},{"@pid":"57/4385","text":"Marc St-Hilaire"},{"@pid":"16/6654","text":"F. Richard Yu"}]},"title":"On Sensor Placement for Directional Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OsaisSY09","doi":"10.1109/ICC.2009.5199248","ee":"https://doi.org/10.1109/ICC.2009.5199248","url":"https://dblp.org/rec/conf/icc/OsaisSY09"}, "url":"URL#5146901" }, { "@score":"1", "@id":"5146902", "info":{"authors":{"author":[{"@pid":"18/4910","text":"Ghaya Rekaya-Ben Othman"},{"@pid":"04/5922","text":"Laura Luzzi"},{"@pid":"77/4717","text":"Jean-Claude Belfiore"}]},"title":"Algebraic Reduction for the Golden Code.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OthmanLB09","doi":"10.1109/ICC.2009.5198713","ee":"https://doi.org/10.1109/ICC.2009.5198713","url":"https://dblp.org/rec/conf/icc/OthmanLB09"}, "url":"URL#5146902" }, { "@score":"1", "@id":"5146903", "info":{"authors":{"author":[{"@pid":"94/7880","text":"Mourad Ouertani"},{"@pid":"41/4264","text":"Huilin Xu"},{"@pid":"03/277","text":"Hichem Besbes"},{"@pid":"52/6918-1","text":"Liuqing Yang 0001"},{"@pid":"47/1585","text":"Ammar Bouallegue"}]},"title":"Differential (De)Modulation for Orthogonal Bi-Pulse Noncoherent UWB.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OuertaniXBYB09","doi":"10.1109/ICC.2009.5198915","ee":"https://doi.org/10.1109/ICC.2009.5198915","url":"https://dblp.org/rec/conf/icc/OuertaniXBYB09"}, "url":"URL#5146903" }, { "@score":"1", "@id":"5146904", "info":{"authors":{"author":[{"@pid":"33/1322","text":"Zhipeng Ouyang"},{"@pid":"16/2866","text":"Lisong Xu"},{"@pid":"65/5635","text":"Byrav Ramamurthy"}]},"title":"A Cooperative Scheme for Dynamic Window Resizing in P2P Live Streaming.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OuyangXR09","doi":"10.1109/ICC.2009.5198585","ee":"https://doi.org/10.1109/ICC.2009.5198585","url":"https://dblp.org/rec/conf/icc/OuyangXR09"}, "url":"URL#5146904" }, { "@score":"1", "@id":"5146905", "info":{"authors":{"author":[{"@pid":"17/7883","text":"Olutayo Oyeyemi Oyerinde"},{"@pid":"33/7883","text":"Stanley H. Mneney"}]},"title":"Decision Directed Channel Estimation for OFDM Systems Employing Fast Data Projection Method Algorithm.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OyerindeM09","doi":"10.1109/ICC.2009.5198884","ee":"https://doi.org/10.1109/ICC.2009.5198884","url":"https://dblp.org/rec/conf/icc/OyerindeM09"}, "url":"URL#5146905" }, { "@score":"1", "@id":"5146906", "info":{"authors":{"author":[{"@pid":"20/2775","text":"Berna Özbek"},{"@pid":"21/485","text":"Didier Le Ruyet"}]},"title":"Reduced Feedback Designs for SDMA-OFDMA Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/OzbekR09","doi":"10.1109/ICC.2009.5199400","ee":"https://doi.org/10.1109/ICC.2009.5199400","url":"https://dblp.org/rec/conf/icc/OzbekR09"}, "url":"URL#5146906" }, { "@score":"1", "@id":"5146907", "info":{"authors":{"author":[{"@pid":"61/7882","text":"Peera Pacharintanakul"},{"@pid":"58/4098","text":"David Tipper"}]},"title":"The Effects of Multi-Layer Traffic on the Survivability of IP-Over-WDM Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PacharintanakulT09","doi":"10.1109/ICC.2009.5199513","ee":"https://doi.org/10.1109/ICC.2009.5199513","url":"https://dblp.org/rec/conf/icc/PacharintanakulT09"}, "url":"URL#5146907" }, { "@score":"1", "@id":"5146908", "info":{"authors":{"author":[{"@pid":"05/1","text":"Pedram Pad"},{"@pid":"75/6691","text":"Mahdi Soltanolkotabi"},{"@pid":"42/2544","text":"Saeed Hadikhanlou"},{"@pid":"94/3293","text":"Arash Enayati"},{"@pid":"06/1232","text":"Farrokh Marvasti"}]},"title":"Errorless Codes for Over-Loaded CDMA with Active User Detection.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PadSHEM09","doi":"10.1109/ICC.2009.5199003","ee":"https://doi.org/10.1109/ICC.2009.5199003","url":"https://dblp.org/rec/conf/icc/PadSHEM09"}, "url":"URL#5146908" }, { "@score":"1", "@id":"5146909", "info":{"authors":{"author":[{"@pid":"15/6904","text":"Jianli Pan"},{"@pid":"j/RajJain","text":"Raj Jain"},{"@pid":"38/1846","text":"Subharthi Paul"},{"@pid":"14/1680","text":"Mic Bowman"},{"@pid":"70/7881","text":"Xiaohu Xu"},{"@pid":"35/1712","text":"Shanzhi Chen"}]},"title":"Enhanced MILSA Architecture for Naming, Addressing, Routing and Security Issues in the Next Generation Internet.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PanJPBXC09","doi":"10.1109/ICC.2009.5198998","ee":"https://doi.org/10.1109/ICC.2009.5198998","url":"https://dblp.org/rec/conf/icc/PanJPBXC09"}, "url":"URL#5146909" }, { "@score":"1", "@id":"5146910", "info":{"authors":{"author":[{"@pid":"31/2714","text":"Yu-Chun Pan"},{"@pid":"50/4276","text":"Yeali S. Sun"},{"@pid":"18/5562","text":"Chun Hsu"},{"@pid":"30/2066","text":"Meng Chang Chen"}]},"title":"A User-Decided Service Model and Resource Management in a Cooperative WiMAX/HSDPA Network.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PanSHC09","doi":"10.1109/ICC.2009.5198688","ee":"https://doi.org/10.1109/ICC.2009.5198688","url":"https://dblp.org/rec/conf/icc/PanSHC09"}, "url":"URL#5146910" }, { "@score":"1", "@id":"5146911", "info":{"authors":{"author":[{"@pid":"10/3000","text":"Zhengang Pan"},{"@pid":"75/1805-1","text":"Yiqing Zhou 0001"},{"@pid":"09/583","text":"Chih-Lin I"}]},"title":"Bit-Wise Exponential ESM (BE-ESM) Method for Accurate Link Level Performance Evaluation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PanZI09","doi":"10.1109/ICC.2009.5198788","ee":"https://doi.org/10.1109/ICC.2009.5198788","url":"https://dblp.org/rec/conf/icc/PanZI09"}, "url":"URL#5146911" }, { "@score":"1", "@id":"5146912", "info":{"authors":{"author":[{"@pid":"70/287","text":"Di Pang"},{"@pid":"90/2236","text":"Lin Tian"},{"@pid":"49/6732","text":"Jinlong Hu"},{"@pid":"01/4623","text":"Jihua Zhou"},{"@pid":"84/1530","text":"Jinglin Shi"},{"@pid":"71/2764","text":"Eryk Dutkiewicz"}]},"title":"Downlink Scheduling for QoS-Guaranteed Services in Multi-User MIMO Systems with Limited Feedback.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PangTHZSD09","doi":"10.1109/ICC.2009.5198948","ee":"https://doi.org/10.1109/ICC.2009.5198948","url":"https://dblp.org/rec/conf/icc/PangTHZSD09"}, "url":"URL#5146912" }, { "@score":"1", "@id":"5146913", "info":{"authors":{"author":[{"@pid":"74/6741","text":"Francesco Paolucci"},{"@pid":"31/3231","text":"Luca Valcarenghi"},{"@pid":"83/1482","text":"Piero Castoldi"},{"@pid":"93/3671","text":"Filippo Cugini"}]},"title":"A Recursive Distributed Topology Discovery Service for Network-Aware Grid Clients.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PaolucciVCC09","doi":"10.1109/ICC.2009.5198661","ee":"https://doi.org/10.1109/ICC.2009.5198661","url":"https://dblp.org/rec/conf/icc/PaolucciVCC09"}, "url":"URL#5146913" }, { "@score":"1", "@id":"5146914", "info":{"authors":{"author":[{"@pid":"06/7884","text":"Anastasios K. Papazafeiropoulos"},{"@pid":"09/733","text":"Stavros A. Kotsopoulos"}]},"title":"The alpha-eta-µ and alpha-lamda-µ Joint Envelope-Phase Fading Distributions.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PapazafeiropoulosK09","doi":"10.1109/ICC.2009.5305936","ee":"https://doi.org/10.1109/ICC.2009.5305936","url":"https://dblp.org/rec/conf/icc/PapazafeiropoulosK09"}, "url":"URL#5146914" }, { "@score":"1", "@id":"5146915", "info":{"authors":{"author":[{"@pid":"91/6525","text":"Hong Ju Park"},{"@pid":"06/5722","text":"Ender Ayanoglu"}]},"title":"Diversity Analysis of Bit-Interleaved Coded Multiple Beamforming.","venue":"ICC","pages":"1-9","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ParkA09","doi":"10.1109/ICC.2009.5198943","ee":"https://doi.org/10.1109/ICC.2009.5198943","url":"https://dblp.org/rec/conf/icc/ParkA09"}, "url":"URL#5146915" }, { "@score":"1", "@id":"5146916", "info":{"authors":{"author":[{"@pid":"92/6473-1","text":"Jaehyun Park 0001"},{"@pid":"06/927","text":"Joohwan Chun"}]},"title":"Lattice Reduction Aided Multi-User MIMO Successive Interference Cancellation Combined with Linear Pre-Equalization.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ParkC09","doi":"10.1109/ICC.2009.5199130","ee":"https://doi.org/10.1109/ICC.2009.5199130","url":"https://dblp.org/rec/conf/icc/ParkC09"}, "url":"URL#5146916" }, { "@score":"1", "@id":"5146917", "info":{"authors":{"author":[{"@pid":"92/6473-1","text":"Jaehyun Park 0001"},{"@pid":"06/927","text":"Joohwan Chun"},{"@pid":"78/5322","text":"Haesun Park"}]},"title":"Efficient GSVD Based Multi-User MIMO Linear Precoding and Antenna Selection Scheme.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ParkCP09","doi":"10.1109/ICC.2009.5198973","ee":"https://doi.org/10.1109/ICC.2009.5198973","url":"https://dblp.org/rec/conf/icc/ParkCP09"}, "url":"URL#5146917" }, { "@score":"1", "@id":"5146918", "info":{"authors":{"author":[{"@pid":"29/5004","text":"Jihoon Park"},{"@pid":"48/6486","text":"Rajeev Jain"},{"@pid":"22/3082","text":"Danijela Cabric"}]},"title":"Spectrum Sensing Design Framework Based on Cross-Layer Optimization of Detection Efficiency.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ParkJC09","doi":"10.1109/ICC.2009.5199480","ee":"https://doi.org/10.1109/ICC.2009.5199480","url":"https://dblp.org/rec/conf/icc/ParkJC09"}, "url":"URL#5146918" }, { "@score":"1", "@id":"5146919", "info":{"authors":{"author":[{"@pid":"21/2070","text":"Ki-Hong Park"},{"@pid":"21/822","text":"Young-Chai Ko"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"},{"@pid":"88/6694","text":"James Sungjin Kim"}]},"title":"Low Complexity Coordinated Beamforming in 2-User MIMO Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ParkKAK09","doi":"10.1109/ICC.2009.5199150","ee":"https://doi.org/10.1109/ICC.2009.5199150","url":"https://dblp.org/rec/conf/icc/ParkKAK09"}, "url":"URL#5146919" }, { "@score":"1", "@id":"5146920", "info":{"authors":{"author":[{"@pid":"29/6075","text":"Seokhwan Park"},{"@pid":"20/6158","text":"Inkyu Lee"}]},"title":"Degrees of Freedom and Sum Rate Maximization for Two Mutually Interfering Broadcast Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ParkL09","doi":"10.1109/ICC.2009.5198887","ee":"https://doi.org/10.1109/ICC.2009.5198887","url":"https://dblp.org/rec/conf/icc/ParkL09"}, "url":"URL#5146920" }, { "@score":"1", "@id":"5146921", "info":{"authors":{"author":[{"@pid":"51/7882","text":"Roope Parviainen"},{"@pid":"60/2242","text":"Juha Ylitalo"},{"@pid":"57/3035","text":"Jukka-Pekka Nuutinen"},{"@pid":"48/7882","text":"Pekka Talmola"},{"@pid":"26/1335","text":"Jukka Henriksson"},{"@pid":"53/7883","text":"Heidi Himmanen"},{"@pid":"93/7880","text":"Reijo Ekman"},{"@pid":"43/7881","text":"Esko Huuhka"}]},"title":"Experimental Investigations on MIMO Radio Channel Characteristics on UHF Band.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ParviainenYNTHHEH09","doi":"10.1109/ICC.2009.5199014","ee":"https://doi.org/10.1109/ICC.2009.5199014","url":"https://dblp.org/rec/conf/icc/ParviainenYNTHHEH09"}, "url":"URL#5146921" }, { "@score":"1", "@id":"5146922", "info":{"authors":{"author":[{"@pid":"63/5750","text":"Volker Pauli"},{"@pid":"04/737","text":"Ingo Viering"},{"@pid":"41/4091","text":"Christian Buchner"},{"@pid":"69/7882","text":"Elie Saad"},{"@pid":"67/2971","text":"Günther Liebl"},{"@pid":"16/6147","text":"Axel Klein"}]},"title":"Efficient Link-to-System level Modeling for Accurate Simulations of MIMO-OFDM Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PauliVBSLK09","doi":"10.1109/ICC.2009.5198975","ee":"https://doi.org/10.1109/ICC.2009.5198975","url":"https://dblp.org/rec/conf/icc/PauliVBSLK09"}, "url":"URL#5146922" }, { "@score":"1", "@id":"5146923", "info":{"authors":{"author":[{"@pid":"00/546","text":"Edward Chu Yeow Peh"},{"@pid":"98/153","text":"Ying-Chang Liang"},{"@pid":"19/5809-1","text":"Yong Liang Guan 0001"}]},"title":"Optimization of Cooperative Sensing in Cognitive Radio Networks: A Sensing-Throughput Tradeoff View.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PehLG09","doi":"10.1109/ICC.2009.5199293","ee":"https://doi.org/10.1109/ICC.2009.5199293","url":"https://dblp.org/rec/conf/icc/PehLG09"}, "url":"URL#5146923" }, { "@score":"1", "@id":"5146924", "info":{"authors":{"author":[{"@pid":"24/7882","text":"Ho Huat Peh"},{"@pid":"44/5924","text":"Athanassios Manikas"},{"@pid":"49/3937","text":"Tjeng Thiang Tjhung"},{"@pid":"10/3679","text":"Wai-Choong Wong"}]},"title":"Joint Transmitter-Receiver Beamforming in Downlink Cyclic Prefix-Free Spatio-Temporal MC-CDMA.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PehMTW09","doi":"10.1109/ICC.2009.5199126","ee":"https://doi.org/10.1109/ICC.2009.5199126","url":"https://dblp.org/rec/conf/icc/PehMTW09"}, "url":"URL#5146924" }, { "@score":"1", "@id":"5146925", "info":{"authors":{"author":[{"@pid":"16/3217","text":"Ronghui Peng"},{"@pid":"04/2896","text":"Rong-Rong Chen"},{"@pid":"69/3244","text":"Behrouz Farhang-Boroujeny"}]},"title":"Low Complexity Markov Chain Monte Carlo Detector for Channels with Intersymbol Interference.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PengCF09","doi":"10.1109/ICC.2009.5199153","ee":"https://doi.org/10.1109/ICC.2009.5199153","url":"https://dblp.org/rec/conf/icc/PengCF09"}, "url":"URL#5146925" }, { "@score":"1", "@id":"5146926", "info":{"authors":{"author":[{"@pid":"03/5954-3","text":"Bo Peng 0003"},{"@pid":"82/3043","text":"Andrew H. Kemp 0001"},{"@pid":"47/3690","text":"Hemat K. Maheshwari"}]},"title":"Power-Saving Geographic Routing in the Presence of Location Errors.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PengKM09","doi":"10.1109/ICC.2009.5199354","ee":"https://doi.org/10.1109/ICC.2009.5199354","url":"https://dblp.org/rec/conf/icc/PengKM09"}, "url":"URL#5146926" }, { "@score":"1", "@id":"5146927", "info":{"authors":{"author":[{"@pid":"71/3107","text":"Federico Penna"},{"@pid":"02/208","text":"Claudio Pastrone"},{"@pid":"85/1633","text":"Maurizio A. Spirito"},{"@pid":"55/3381","text":"Roberto Garello"}]},"title":"Energy Detection Spectrum Sensing with Discontinuous Primary User Signal.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PennaPSG09","doi":"10.1109/ICC.2009.5198987","ee":"https://doi.org/10.1109/ICC.2009.5198987","url":"https://dblp.org/rec/conf/icc/PennaPSG09"}, "url":"URL#5146927" }, { "@score":"1", "@id":"5146928", "info":{"authors":{"author":[{"@pid":"14/7883","text":"Etienne Perron"},{"@pid":"d/SNDiggavi","text":"Suhas N. Diggavi"},{"@pid":"27/2176","text":"Emre Telatar"}]},"title":"The Interference-Multiple-Access Channel.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PerronDT09","doi":"10.1109/ICC.2009.5199515","ee":"https://doi.org/10.1109/ICC.2009.5199515","url":"https://dblp.org/rec/conf/icc/PerronDT09"}, "url":"URL#5146928" }, { "@score":"1", "@id":"5146929", "info":{"authors":{"author":[{"@pid":"72/7209","text":"Dionysia K. Petraki"},{"@pid":"67/5300","text":"Markos P. Anastasopoulos"},{"@pid":"09/3053","text":"Tarik Taleb"},{"@pid":"40/4747","text":"Athanasios V. Vasilakos"}]},"title":"Positioning in Multibeam Geostationary Satellite Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PetrakiATV09","doi":"10.1109/ICC.2009.5199344","ee":"https://doi.org/10.1109/ICC.2009.5199344","url":"https://dblp.org/rec/conf/icc/PetrakiATV09"}, "url":"URL#5146929" }, { "@score":"1", "@id":"5146930", "info":{"authors":{"author":[{"@pid":"37/4685","text":"The-Hanh Pham"},{"@pid":"98/153","text":"Ying-Chang Liang"},{"@pid":"33/2397","text":"Arumugam Nallanathan"},{"@pid":"09/336","text":"Hari Krishna Garg"}]},"title":"Iterative Receiver for Multi-Input Multi-Output (MIMO) Two-Way Wireless Relay Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PhamLNG09","doi":"10.1109/ICC.2009.5199107","ee":"https://doi.org/10.1109/ICC.2009.5199107","url":"https://dblp.org/rec/conf/icc/PhamLNG09"}, "url":"URL#5146930" }, { "@score":"1", "@id":"5146931", "info":{"authors":{"author":[{"@pid":"63/7206","text":"Tung T. Pham"},{"@pid":"55/1768-1","text":"Ha H. Nguyen 0001"},{"@pid":"51/4580","text":"Hoang Duong Tuan"}]},"title":"Power Allocation in Wireless Relay Networks with Partial Channel State Information.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PhamNT09","doi":"10.1109/ICC.2009.5199350","ee":"https://doi.org/10.1109/ICC.2009.5199350","url":"https://dblp.org/rec/conf/icc/PhamNT09"}, "url":"URL#5146931" }, { "@score":"1", "@id":"5146932", "info":{"authors":{"author":[{"@pid":"88/7883","text":"Duc-Minh Pham"},{"@pid":"81/2641","text":"A. Benjamin Premkumar"},{"@pid":"66/549","text":"A. S. Madhukumar"}]},"title":"Efficient Sample Rate Conversion in Software Radio Employing Folding Number System.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PhamPM09","doi":"10.1109/ICC.2009.5198979","ee":"https://doi.org/10.1109/ICC.2009.5198979","url":"https://dblp.org/rec/conf/icc/PhamPM09"}, "url":"URL#5146932" }, { "@score":"1", "@id":"5146933", "info":{"authors":{"author":[{"@pid":"p/RCWPhan","text":"Raphael Chung-Wei Phan"},{"@pid":"65/3314","text":"Jean-Philippe Aumasson"}]},"title":"On Hashing with Tweakable Ciphers.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PhanA09","doi":"10.1109/ICC.2009.5199240","ee":"https://doi.org/10.1109/ICC.2009.5199240","url":"https://dblp.org/rec/conf/icc/PhanA09"}, "url":"URL#5146933" }, { "@score":"1", "@id":"5146934", "info":{"authors":{"author":[{"@pid":"76/8262","text":"Khoa Tran Phan"},{"@pid":"41/2782","text":"Long Bao Le"},{"@pid":"74/6270","text":"Sergiy A. Vorobyov"},{"@pid":"41/2926","text":"Tho Le-Ngoc"}]},"title":"Centralized and Distributed Power Allocation in Multi-User Wireless Relay Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PhanLVL09","doi":"10.1109/ICC.2009.5198813","ee":"https://doi.org/10.1109/ICC.2009.5198813","url":"https://dblp.org/rec/conf/icc/PhanLVL09"}, "url":"URL#5146934" }, { "@score":"1", "@id":"5146935", "info":{"authors":{"author":[{"@pid":"73/4724","text":"Andrea Di Pietro"},{"@pid":"65/5175","text":"Domenico Ficara"},{"@pid":"80/6788","text":"Stefano Giordano"},{"@pid":"74/483","text":"Francesco Oppedisano"},{"@pid":"80/2397","text":"Gregorio Procissi"},{"@pid":"98/3400","text":"Fabio Vitucci"}]},"title":"Merging Spanning Trees in Tomographic Network Topology Discovery.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PietroFGOPV09","doi":"10.1109/ICC.2009.5199178","ee":"https://doi.org/10.1109/ICC.2009.5199178","url":"https://dblp.org/rec/conf/icc/PietroFGOPV09"}, "url":"URL#5146935" }, { "@score":"1", "@id":"5146936", "info":{"authors":{"author":[{"@pid":"12/5310","text":"Cecilio Pimentel"},{"@pid":"74/4636","text":"Fady Alajaji"}]},"title":"A Discrete Channel Model for Capturing Memory and Soft-Decision Information: A Capacity Study.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PimentelA09","doi":"10.1109/ICC.2009.5198594","ee":"https://doi.org/10.1109/ICC.2009.5198594","url":"https://dblp.org/rec/conf/icc/PimentelA09"}, "url":"URL#5146936" }, { "@score":"1", "@id":"5146937", "info":{"authors":{"author":[{"@pid":"24/2906","text":"Esa Piri"},{"@pid":"34/2602","text":"Kostas Pentikousis"}]},"title":"Towards a GNU/Linux IEEE 802.21 Implementation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PiriP09","doi":"10.1109/ICC.2009.5199534","ee":"https://doi.org/10.1109/ICC.2009.5199534","url":"https://dblp.org/rec/conf/icc/PiriP09"}, "url":"URL#5146937" }, { "@score":"1", "@id":"5146938", "info":{"authors":{"author":[{"@pid":"77/5920","text":"Sara Pizzi"},{"@pid":"11/4677","text":"Antonella Molinaro"},{"@pid":"86/4818","text":"Antonio Iera"}]},"title":"On the Performance of "Compensation-Based" and "Greedy" Scheduling Policies in IEEE 802.16 Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PizziMI09","doi":"10.1109/ICC.2009.5199261","ee":"https://doi.org/10.1109/ICC.2009.5199261","url":"https://dblp.org/rec/conf/icc/PizziMI09"}, "url":"URL#5146938" }, { "@score":"1", "@id":"5146939", "info":{"authors":{"author":[{"@pid":"08/7883","text":"Christopher Pluntke"},{"@pid":"80/2984","text":"Michael Menth"},{"@pid":"82/4840","text":"Michael Duelli"}]},"title":"CAPEX-Aware Design of Survivable DWDM Mesh Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PluntkeMD09","doi":"10.1109/ICC.2009.5198809","ee":"https://doi.org/10.1109/ICC.2009.5198809","url":"https://dblp.org/rec/conf/icc/PluntkeMD09"}, "url":"URL#5146939" }, { "@score":"1", "@id":"5146940", "info":{"authors":{"author":[{"@pid":"62/5103","text":"Mario Poggioni"},{"@pid":"80/4766","text":"Matteo Berioli"},{"@pid":"10/5613","text":"Paolo Banelli"}]},"title":"BER Performance of Multibeam Satellite Systems with Tomlinson-Harashima Precoding.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PoggioniBB09","doi":"10.1109/ICC.2009.5198782","ee":"https://doi.org/10.1109/ICC.2009.5198782","url":"https://dblp.org/rec/conf/icc/PoggioniBB09"}, "url":"URL#5146940" }, { "@score":"1", "@id":"5146941", "info":{"authors":{"author":[{"@pid":"80/1859","text":"Silvana Greco Polito"},{"@pid":"15/5903","text":"Mohit Chamania"},{"@pid":"30/1610","text":"Admela Jukan"}]},"title":"Extending the Inter-Domain PCE Framework for Authentication and Authorization in GMPLS Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PolitoCJ09","doi":"10.1109/ICC.2009.5199021","ee":"https://doi.org/10.1109/ICC.2009.5199021","url":"https://dblp.org/rec/conf/icc/PolitoCJ09"}, "url":"URL#5146941" }, { "@score":"1", "@id":"5146942", "info":{"authors":{"author":[{"@pid":"72/4438","text":"Sofie Pollin"},{"@pid":"93/1587","text":"Ahmad Bahai"}]},"title":"Performance Analysis of Double-Channel 802.11n Contending with Single-Channel 802.11.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PollinB09","doi":"10.1109/ICC.2009.5199308","ee":"https://doi.org/10.1109/ICC.2009.5199308","url":"https://dblp.org/rec/conf/icc/PollinB09"}, "url":"URL#5146942" }, { "@score":"1", "@id":"5146943", "info":{"authors":{"author":[{"@pid":"29/6263","text":"Thadpong Pongthawornkamol"},{"@pid":"45/3224","text":"Klara Nahrstedt"},{"@pid":"35/1916","text":"Guijun Wang"}]},"title":"HybridCast: A Hybrid Probabilistic/Deterministic Approach for Adjustable Broadcast Reliability in Mobile Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PongthawornkamolNW09","doi":"10.1109/ICC.2009.5199060","ee":"https://doi.org/10.1109/ICC.2009.5199060","url":"https://dblp.org/rec/conf/icc/PongthawornkamolNW09"}, "url":"URL#5146943" }, { "@score":"1", "@id":"5146944", "info":{"authors":{"author":[{"@pid":"75/6928","text":"Julien Pons"},{"@pid":"86/76","text":"Patrick Duvaut"}]},"title":"New Approaches for Lowering Path Expansion Complexity of K-Best MIMO Detection Algorithms.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PonsD09","doi":"10.1109/ICC.2009.5199220","ee":"https://doi.org/10.1109/ICC.2009.5199220","url":"https://dblp.org/rec/conf/icc/PonsD09"}, "url":"URL#5146944" }, { "@score":"1", "@id":"5146945", "info":{"authors":{"author":[{"@pid":"75/6947","text":"Haralampos Pozidis"},{"@pid":"07/5927","text":"Giovanni Cherubini"}]},"title":"Probabilistic Data Detection for Probe-Based Storage Channels in the Presence of Jitter.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/PozidisC09","doi":"10.1109/ICC.2009.5199366","ee":"https://doi.org/10.1109/ICC.2009.5199366","url":"https://dblp.org/rec/conf/icc/PozidisC09"}, "url":"URL#5146945" }, { "@score":"1", "@id":"5146946", "info":{"authors":{"author":[{"@pid":"18/3332","text":"Jarmo Prokkola"},{"@pid":"28/3460","text":"Pekka H. J. Perälä"},{"@pid":"64/616","text":"Mikko Hanski"},{"@pid":"24/2906","text":"Esa Piri"}]},"title":"3G/HSPA Performance in Live Networks from the End User Perspective.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ProkkolaPHP09","doi":"10.1109/ICC.2009.5198575","ee":"https://doi.org/10.1109/ICC.2009.5198575","url":"https://dblp.org/rec/conf/icc/ProkkolaPHP09"}, "url":"URL#5146946" }, { "@score":"1", "@id":"5146947", "info":{"authors":{"author":[{"@pid":"66/4707","text":"Saad B. Qaisar"},{"@pid":"r/HayderRadha","text":"Hayder Radha"}]},"title":"Multipath Distributed Data Reliability for Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/QaisarR09","doi":"10.1109/ICC.2009.5199203","ee":"https://doi.org/10.1109/ICC.2009.5199203","url":"https://dblp.org/rec/conf/icc/QaisarR09"}, "url":"URL#5146947" }, { "@score":"1", "@id":"5146948", "info":{"authors":{"author":[{"@pid":"07/4606","text":"Jian Qi"},{"@pid":"77/1439","text":"Sonia Aïssa"}]},"title":"On the Effect of Power Amplifier Nonlinearity on MIMO Transmit Diversity Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/QiA09","doi":"10.1109/ICC.2009.5199252","ee":"https://doi.org/10.1109/ICC.2009.5199252","url":"https://dblp.org/rec/conf/icc/QiA09"}, "url":"URL#5146948" }, { "@score":"1", "@id":"5146949", "info":{"authors":{"author":[{"@pid":"10/2589","text":"Yinan Qi"},{"@pid":"08/6048","text":"Reza Hoshyar"},{"@pid":"18/380","text":"Rahim Tafazolli"}]},"title":"On the Performance of HARQ with Hybrid Relaying Schemes.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/QiHT09","doi":"10.1109/ICC.2009.5199263","ee":"https://doi.org/10.1109/ICC.2009.5199263","url":"https://dblp.org/rec/conf/icc/QiHT09"}, "url":"URL#5146949" }, { "@score":"1", "@id":"5146950", "info":{"authors":{"author":[{"@pid":"50/1689","text":"Deli Qiao"},{"@pid":"54/5244","text":"Mustafa Cenk Gursoy"},{"@pid":"85/6636","text":"Senem Velipasalar"}]},"title":"Energy Efficiency of Fixed-Rate Wireless Transmissions under QoS Constraints.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/QiaoGV09","doi":"10.1109/ICC.2009.5198988","ee":"https://doi.org/10.1109/ICC.2009.5198988","url":"https://dblp.org/rec/conf/icc/QiaoGV09"}, "url":"URL#5146950" }, { "@score":"1", "@id":"5146951", "info":{"authors":{"author":[{"@pid":"14/6841-2","text":"Tao Qin 0002"},{"@pid":"45/503","text":"Xiaohong Guan"},{"@pid":"64/6025-29","text":"Wei Li 0029"},{"@pid":"84/7882","text":"Pinghui Wang"}]},"title":"Monitoring Abnormal Traffic Flows Based on Independent Component Analysis.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/QinGLW09","doi":"10.1109/ICC.2009.5199196","ee":"https://doi.org/10.1109/ICC.2009.5199196","url":"https://dblp.org/rec/conf/icc/QinGLW09"}, "url":"URL#5146951" }, { "@score":"1", "@id":"5146952", "info":{"authors":{"author":[{"@pid":"12/1707","text":"Ying Qiu"},{"@pid":"46/1953-1","text":"Feng Bao 0001"},{"@pid":"79/4033","text":"Yongdong Wu"},{"@pid":"55/2303","text":"Yanjiang Yang"}]},"title":"A Lightweight Fast Handover Authentication Scheme in Mobile Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/QiuBWY09","doi":"10.1109/ICC.2009.5198620","ee":"https://doi.org/10.1109/ICC.2009.5198620","url":"https://dblp.org/rec/conf/icc/QiuBWY09"}, "url":"URL#5146952" }, { "@score":"1", "@id":"5146953", "info":{"authors":{"author":[{"@pid":"22/742","text":"Jian Qiu"},{"@pid":"29/4867-26","text":"Yong Liu 0026"},{"@pid":"m/GMohan","text":"Gurusamy Mohan"},{"@pid":"66/5539","text":"Kee Chaing Chua"}]},"title":"Fast Spanning Tree Reconnection for Resilient Metro Ethernet Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/QiuLMC09","doi":"10.1109/ICC.2009.5199031","ee":"https://doi.org/10.1109/ICC.2009.5199031","url":"https://dblp.org/rec/conf/icc/QiuLMC09"}, "url":"URL#5146953" }, { "@score":"1", "@id":"5146954", "info":{"authors":{"author":[{"@pid":"47/5185","text":"Zhi Quan"},{"@pid":"03/2134-37","text":"Jie Liu 0037"},{"@pid":"86/3184","text":"Yuriy V. Zakharov"}]},"title":"FPGA Design of Box-Constrained MIMO Detector.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/QuanLZ09","doi":"10.1109/ICC.2009.5199037","ee":"https://doi.org/10.1109/ICC.2009.5199037","url":"https://dblp.org/rec/conf/icc/QuanLZ09"}, "url":"URL#5146954" }, { "@score":"1", "@id":"5146955", "info":{"authors":{"author":[{"@pid":"95/4619","text":"Kiran Rachuri"},{"@pid":"78/4000","text":"C. Siva Ram Murthy"}]},"title":"Level Biased Random Walk for Information Discovery in Wireless Sensor Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RachuriM09","doi":"10.1109/ICC.2009.5199131","ee":"https://doi.org/10.1109/ICC.2009.5199131","url":"https://dblp.org/rec/conf/icc/RachuriM09"}, "url":"URL#5146955" }, { "@score":"1", "@id":"5146956", "info":{"authors":{"author":[{"@pid":"68/2208","text":"Amir Hamed Mohsenian Rad"},{"@pid":"77/623-1","text":"Jianwei Huang 0001"},{"@pid":"54/3080","text":"Vincent W. S. Wong 0001"},{"@pid":"77/4320","text":"Sidharth Jaggi"},{"@pid":"95/2265","text":"Robert Schober"}]},"title":"A Game-Theoretic Analysis of Inter-Session Network Coding.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RadHWJS09","doi":"10.1109/ICC.2009.5198609","ee":"https://doi.org/10.1109/ICC.2009.5198609","url":"https://dblp.org/rec/conf/icc/RadHWJS09"}, "url":"URL#5146956" }, { "@score":"1", "@id":"5146957", "info":{"authors":{"author":[{"@pid":"10/7884","text":"Rathnakumar Radhakrishnan"},{"@pid":"35/6893","text":"Bane Vasic"}]},"title":"Joint Message-Passing Symbol-Decoding of LDPC Coded Signals over Partial-Response Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RadhakrishnanV09","doi":"10.1109/ICC.2009.5199115","ee":"https://doi.org/10.1109/ICC.2009.5199115","url":"https://dblp.org/rec/conf/icc/RadhakrishnanV09"}, "url":"URL#5146957" }, { "@score":"1", "@id":"5146958", "info":{"authors":{"author":[{"@pid":"93/948","text":"Svetlana Radosavac"},{"@pid":"11/4993","text":"Ulas C. Kozat"},{"@pid":"39/5920","text":"James Kempf"}]},"title":"On the Use of Admission Control for Better Quality of Security.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RadosavacKK09","doi":"10.1109/ICC.2009.5199268","ee":"https://doi.org/10.1109/ICC.2009.5199268","url":"https://dblp.org/rec/conf/icc/RadosavacKK09"}, "url":"URL#5146958" }, { "@score":"1", "@id":"5146959", "info":{"authors":{"author":[{"@pid":"94/1908","text":"M. R. Raghavendra"},{"@pid":"65/5662","text":"Markku J. Juntti"},{"@pid":"89/4291","text":"Markus Myllylä"}]},"title":"Co-Channel Interference Mitigation for 3G LTE MIMO-OFDM Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RaghavendraJM09","doi":"10.1109/ICC.2009.5198827","ee":"https://doi.org/10.1109/ICC.2009.5198827","url":"https://dblp.org/rec/conf/icc/RaghavendraJM09"}, "url":"URL#5146959" }, { "@score":"1", "@id":"5146960", "info":{"authors":{"author":[{"@pid":"40/6727","text":"Ritesh Rajore"},{"@pid":"n/SKNandy","text":"S. K. Nandy 0001"},{"@pid":"17/603","text":"H. S. Jamadagni"}]},"title":"Architecture of Run-Time Reconfigurable Channel Decoder.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RajoreNJ09","doi":"10.1109/ICC.2009.5198763","ee":"https://doi.org/10.1109/ICC.2009.5198763","url":"https://dblp.org/rec/conf/icc/RajoreNJ09"}, "url":"URL#5146960" }, { "@score":"1", "@id":"5146961", "info":{"authors":{"author":[{"@pid":"48/2625","text":"Vaidyanathan Ramaswami"},{"@pid":"18/6174","text":"Rittwik Jana"},{"@pid":"96/1092","text":"Soohan Ahn"}]},"title":"Limited Chain Relay - A Novel Multimedia Distribution Algorithm and Its Analysis.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RamaswamiJA09","doi":"10.1109/ICC.2009.5305950","ee":"https://doi.org/10.1109/ICC.2009.5305950","url":"https://dblp.org/rec/conf/icc/RamaswamiJA09"}, "url":"URL#5146961" }, { "@score":"1", "@id":"5146962", "info":{"authors":{"author":[{"@pid":"79/5181","text":"Stefan Rass"},{"@pid":"98/4956","text":"Peter Schartner"},{"@pid":"94/886","text":"Michaela Greiler"}]},"title":"Quantum Coin-Flipping-Based Authentication.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RassSG09","doi":"10.1109/ICC.2009.5199383","ee":"https://doi.org/10.1109/ICC.2009.5199383","url":"https://dblp.org/rec/conf/icc/RassSG09"}, "url":"URL#5146962" }, { "@score":"1", "@id":"5146963", "info":{"authors":{"author":{"@pid":"31/5408","text":"Kaliappa Ravindran"}},"title":"Reconfigurable Peer-to-Peer Connectivity Overlays for Information Assurance Applications.","venue":"ICC","pages":"1-7","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Ravindran09","doi":"10.1109/ICC.2009.5199397","ee":"https://doi.org/10.1109/ICC.2009.5199397","url":"https://dblp.org/rec/conf/icc/Ravindran09"}, "url":"URL#5146963" }, { "@score":"1", "@id":"5146964", "info":{"authors":{"author":[{"@pid":"06/4769","text":"Saikat Ray"},{"@pid":"45/4107","text":"Ratul K. Guha"},{"@pid":"36/7884","text":"Wisam Yasen"},{"@pid":"93/2715","text":"Mary Austin"}]},"title":"SAMPLER: An Optimal MAC Algorithm for Wireless Instrumentation Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RayGYA09","doi":"10.1109/ICC.2009.5199432","ee":"https://doi.org/10.1109/ICC.2009.5199432","url":"https://dblp.org/rec/conf/icc/RayGYA09"}, "url":"URL#5146964" }, { "@score":"1", "@id":"5146965", "info":{"authors":{"author":[{"@pid":"00/2502","text":"Adeel Razi"},{"@pid":"63/1161","text":"Daniel J. Ryan"},{"@pid":"07/3441","text":"Iain B. Collings"},{"@pid":"50/567","text":"Jinhong Yuan"}]},"title":"Sum Rates and User Scheduling for Multi-User MIMO Vector Perturbation Precoding.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RaziRCY09","doi":"10.1109/ICC.2009.5199498","ee":"https://doi.org/10.1109/ICC.2009.5199498","url":"https://dblp.org/rec/conf/icc/RaziRCY09"}, "url":"URL#5146965" }, { "@score":"1", "@id":"5146966", "info":{"authors":{"author":[{"@pid":"38/2028","text":"Huw Read"},{"@pid":"74/1840","text":"Andrew Blyth"},{"@pid":"20/3428","text":"Iain Sutherland"}]},"title":"A Unified Approach to Network Traffic and Network Security Visualisation.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ReadBS09","doi":"10.1109/ICC.2009.5198685","ee":"https://doi.org/10.1109/ICC.2009.5198685","url":"https://dblp.org/rec/conf/icc/ReadBS09"}, "url":"URL#5146966" }, { "@score":"1", "@id":"5146967", "info":{"authors":{"author":[{"@pid":"26/4025","text":"Tamma Bheemarjuna Reddy"},{"@pid":"94/2319","text":"Nicola Baldo"},{"@pid":"47/5130","text":"B. S. Manoj 0001"},{"@pid":"r/RameshRRao","text":"Ramesh R. Rao"}]},"title":"Multi-Channel Wireless Traffic Sensing and Characterization for Cognitive Networking.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ReddyBMR09","doi":"10.1109/ICC.2009.5199197","ee":"https://doi.org/10.1109/ICC.2009.5199197","url":"https://dblp.org/rec/conf/icc/ReddyBMR09"}, "url":"URL#5146967" }, { "@score":"1", "@id":"5146968", "info":{"authors":{"author":[{"@pid":"62/7883","text":"Kellyn Rein"},{"@pid":"54/1907","text":"Ulrich Schade"},{"@pid":"12/3962","text":"Michael R. Hieb"}]},"title":"Battle Management Language (BML) As an Enabler.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ReinSH09","doi":"10.1109/ICC.2009.5198779","ee":"https://doi.org/10.1109/ICC.2009.5198779","url":"https://dblp.org/rec/conf/icc/ReinSH09"}, "url":"URL#5146968" }, { "@score":"1", "@id":"5146969", "info":{"authors":{"author":[{"@pid":"31/7005","text":"Yonglin Ren"},{"@pid":"b/AzzedineBoukerche","text":"Azzedine Boukerche"}]},"title":"Performance Analysis of Trust-Based Node Evaluation Schemes in Wireless and Mobile Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RenB09","doi":"10.1109/ICC.2009.5305933","ee":"https://doi.org/10.1109/ICC.2009.5305933","url":"https://dblp.org/rec/conf/icc/RenB09"}, "url":"URL#5146969" }, { "@score":"1", "@id":"5146970", "info":{"authors":{"author":[{"@pid":"28/2359","text":"Pinyi Ren"},{"@pid":"52/1719","text":"Jia Feng"},{"@pid":"53/5490","text":"Ping Hu"},{"@pid":"72/3887","text":"Jun Cai"}]},"title":"Energy Saving Ad-Hoc On-Demand Distance Vector Routing for Mobile Ad-Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RenFHC09","doi":"10.1109/ICC.2009.5198993","ee":"https://doi.org/10.1109/ICC.2009.5198993","url":"https://dblp.org/rec/conf/icc/RenFHC09"}, "url":"URL#5146970" }, { "@score":"1", "@id":"5146971", "info":{"authors":{"author":[{"@pid":"60/4548","text":"Shaolei Ren"},{"@pid":"95/5358","text":"Khaled Ben Letaief"}]},"title":"Minimum Sum Expected Distortion in Cooperative Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RenL09","doi":"10.1109/ICC.2009.5199184","ee":"https://doi.org/10.1109/ICC.2009.5199184","url":"https://dblp.org/rec/conf/icc/RenL09"}, "url":"URL#5146971" }, { "@score":"1", "@id":"5146972", "info":{"authors":{"author":[{"@pid":"59/2180-1","text":"Jian Ren 0001"},{"@pid":"87/6284-11","text":"Yun Li 0011"},{"@pid":"32/4638","text":"Tongtong Li"}]},"title":"Routing-Based Source-Location Privacy in Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RenLL09","doi":"10.1109/ICC.2009.5199430","ee":"https://doi.org/10.1109/ICC.2009.5199430","url":"https://dblp.org/rec/conf/icc/RenLL09"}, "url":"URL#5146972" }, { "@score":"1", "@id":"5146973", "info":{"authors":{"author":[{"@pid":"59/2622","text":"Giovanni Resta"},{"@pid":"43/1361","text":"Paolo Santi"}]},"title":"Latency and Capacity Optimal Broadcasting in Wireless Multihop Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RestaS09","doi":"10.1109/ICC.2009.5199129","ee":"https://doi.org/10.1109/ICC.2009.5199129","url":"https://dblp.org/rec/conf/icc/RestaS09"}, "url":"URL#5146973" }, { "@score":"1", "@id":"5146974", "info":{"authors":{"author":[{"@pid":"81/2859","text":"Raja Ali Riaz"},{"@pid":"29/4265","text":"Robert G. Maunder"},{"@pid":"78/3786","text":"Muhammad Fasih Uddin Butt"},{"@pid":"25/6170","text":"Soon Xin Ng"},{"@pid":"34/1910","text":"Sheng Chen 0001"},{"@pid":"92/5955","text":"Lajos Hanzo"}]},"title":"Three-Stage Concatenated Ultra-Wide Bandwidth Time-Hopping Spread-Spectrum Impulse Radio Using Iterative Detection.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RiazMBNCH09","doi":"10.1109/ICC.2009.5199523","ee":"https://doi.org/10.1109/ICC.2009.5199523","url":"https://dblp.org/rec/conf/icc/RiazMBNCH09"}, "url":"URL#5146974" }, { "@score":"1", "@id":"5146975", "info":{"authors":{"author":[{"@pid":"80/3923","text":"Nathan Ricklin"},{"@pid":"64/2524","text":"James R. Zeidler"}]},"title":"Block Detection of Multiple Symbol DPSK in a Statistically Unknown Time-Varying Channel.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RicklinZ09","doi":"10.1109/ICC.2009.5198795","ee":"https://doi.org/10.1109/ICC.2009.5198795","url":"https://dblp.org/rec/conf/icc/RicklinZ09"}, "url":"URL#5146975" }, { "@score":"1", "@id":"5146976", "info":{"authors":{"author":[{"@pid":"07/7392","text":"Maximilian Riemensberger"},{"@pid":"01/1945","text":"Yalin Evren Sagduyu"},{"@pid":"h/MichaelLHonig","text":"Michael L. Honig"},{"@pid":"34/5115","text":"Wolfgang Utschick"}]},"title":"Comparison of Analog and Digital Relay Methods with Network Coding for Wireless Multicast.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RiemensbergerSHU09","doi":"10.1109/ICC.2009.5198836","ee":"https://doi.org/10.1109/ICC.2009.5198836","url":"https://dblp.org/rec/conf/icc/RiemensbergerSHU09"}, "url":"URL#5146976" }, { "@score":"1", "@id":"5146977", "info":{"authors":{"author":[{"@pid":"03/5928","text":"Panagiotis Rizomiliotis"},{"@pid":"97/7883","text":"Adonis Bogris"},{"@pid":"38/7884","text":"Dimitris Syvridis"}]},"title":"Message Origin Authentication and Integrity Protection in Chaos-Based Optical Communication.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RizomiliotisBS09","doi":"10.1109/ICC.2009.5199179","ee":"https://doi.org/10.1109/ICC.2009.5199179","url":"https://dblp.org/rec/conf/icc/RizomiliotisBS09"}, "url":"URL#5146977" }, { "@score":"1", "@id":"5146978", "info":{"authors":{"author":[{"@pid":"55/6472","text":"Miguel Rodelgo-Lacruz"},{"@pid":"20/4318","text":"Cristina López-Bravo"},{"@pid":"12/698","text":"Francisco J. González-Castaño"},{"@pid":"48/1215","text":"H. Jonathan Chao"}]},"title":"Practical Scalability of Wavelength Routing Switches.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Rodelgo-LacruzLGC09","doi":"10.1109/ICC.2009.5199357","ee":"https://doi.org/10.1109/ICC.2009.5199357","url":"https://dblp.org/rec/conf/icc/Rodelgo-LacruzLGC09"}, "url":"URL#5146978" }, { "@score":"1", "@id":"5146979", "info":{"authors":{"author":[{"@pid":"39/89","text":"Virgilio Rodriguez"},{"@pid":"m/RMathar","text":"Rudolf Mathar"}]},"title":"A Generalised Multi-Receiver Radio Network and Its Decomposition into Independent Transmitter-Receiver Pairs: Simple Feasibility Condition and Power Levels in Closed Form.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RodriguezM09","doi":"10.1109/ICC.2009.5198610","ee":"https://doi.org/10.1109/ICC.2009.5198610","url":"https://dblp.org/rec/conf/icc/RodriguezM09"}, "url":"URL#5146979" }, { "@score":"1", "@id":"5146980", "info":{"authors":{"author":{"@pid":"89/181","text":"Yue Rong"}},"title":"Non-Regenerative Multicarrier MIMO Relay Communications Based on Minimization of Mean-Squared Error.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Rong09","doi":"10.1109/ICC.2009.5199225","ee":"https://doi.org/10.1109/ICC.2009.5199225","url":"https://dblp.org/rec/conf/icc/Rong09"}, "url":"URL#5146980" }, { "@score":"1", "@id":"5146981", "info":{"authors":{"author":{"@pid":"89/181","text":"Yue Rong"}},"title":"MMSE-Based Non-Regenerative Multicarrier MIMO Wireless Relay Communications with Direct Source-Destination Link.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Rong09a","doi":"10.1109/ICC.2009.5199187","ee":"https://doi.org/10.1109/ICC.2009.5199187","url":"https://dblp.org/rec/conf/icc/Rong09a"}, "url":"URL#5146981" }, { "@score":"1", "@id":"5146982", "info":{"authors":{"author":[{"@pid":"29/7883","text":"Sávio R. A. dos Santos Rosa"},{"@pid":"72/6853","text":"André C. Drummond"},{"@pid":"f/NelsonLSdaFonseca","text":"Nelson L. S. da Fonseca"}]},"title":"Lightpath Establishment in WDM Networks with Best Effort Shared Path Protection in Impaired-Transmissions.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RosaDF09","doi":"10.1109/ICC.2009.5199133","ee":"https://doi.org/10.1109/ICC.2009.5199133","url":"https://dblp.org/rec/conf/icc/RosaDF09"}, "url":"URL#5146982" }, { "@score":"1", "@id":"5146983", "info":{"authors":{"author":[{"@pid":"53/6203","text":"Zvi Rosberg"},{"@pid":"89/4263","text":"Craig Russell"},{"@pid":"63/6049","text":"Vijay Sivaraman"}]},"title":"Rate and End-to-End Delay Control for Multicast and Unicast Flows.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RosbergRS09","doi":"10.1109/ICC.2009.5199390","ee":"https://doi.org/10.1109/ICC.2009.5199390","url":"https://dblp.org/rec/conf/icc/RosbergRS09"}, "url":"URL#5146983" }, { "@score":"1", "@id":"5146984", "info":{"authors":{"author":[{"@pid":"14/3340","text":"Dario Rossi 0001"},{"@pid":"18/6316","text":"Marco Mellia"},{"@pid":"98/5305","text":"Michela Meo"}]},"title":"Evidences Behind Skype Outage.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RossiMM09","doi":"10.1109/ICC.2009.5199012","ee":"https://doi.org/10.1109/ICC.2009.5199012","url":"https://dblp.org/rec/conf/icc/RossiMM09"}, "url":"URL#5146984" }, { "@score":"1", "@id":"5146985", "info":{"authors":{"author":[{"@pid":"53/5151","text":"Peter Rost"},{"@pid":"f/GFettweis","text":"Gerhard P. Fettweis"},{"@pid":"35/4573","text":"J. Nicholas Laneman"}]},"title":"Opportunities, Constraints, and Benefits of Relaying in the Presence of Interference.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RostFL09","doi":"10.1109/ICC.2009.5199274","ee":"https://doi.org/10.1109/ICC.2009.5199274","url":"https://dblp.org/rec/conf/icc/RostFL09"}, "url":"URL#5146985" }, { "@score":"1", "@id":"5146986", "info":{"authors":{"author":[{"@pid":"22/3607","text":"Pawel Rózycki"},{"@pid":"04/7883","text":"Janusz Korniak"},{"@pid":"28/6064","text":"Andrzej Jajszczyk"}]},"title":"GMPLS Network Reliability Enhancement by Using the Dominating Nodes Approach.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RozyckiKJ09","doi":"10.1109/ICC.2009.5199047","ee":"https://doi.org/10.1109/ICC.2009.5199047","url":"https://dblp.org/rec/conf/icc/RozyckiKJ09"}, "url":"URL#5146986" }, { "@score":"1", "@id":"5146987", "info":{"authors":{"author":[{"@pid":"84/4123","text":"Javier Rubio-Loyola"},{"@pid":"02/4276","text":"Carlos Mérida-Campos"},{"@pid":"76/3360","text":"Steven Willmott"},{"@pid":"42/2552","text":"Antonio Astorga"},{"@pid":"44/1391","text":"Joan Serrat 0001"},{"@pid":"75/699","text":"Alex Galis"}]},"title":"Service Coalitions for Future Internet Services.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Rubio-LoyolaMWASG09","doi":"10.1109/ICC.2009.5199454","ee":"https://doi.org/10.1109/ICC.2009.5199454","url":"https://dblp.org/rec/conf/icc/Rubio-LoyolaMWASG09"}, "url":"URL#5146987" }, { "@score":"1", "@id":"5146988", "info":{"authors":{"author":[{"@pid":"55/3387","text":"Yun Rui"},{"@pid":"96/5737","text":"Honglin Hu"},{"@pid":"70/3686","text":"Mingqi Li"},{"@pid":"37/4356-12","text":"Xiaodong Zhang 0012"},{"@pid":"42/2346","text":"Huiyue Yi"},{"@pid":"48/450-1","text":"Yang Yang 0001"}]},"title":"Comparing Effects of Carrier Frequency Offset on Generalized Multi-Carrier and OFDM Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RuiHLZYY09","doi":"10.1109/ICC.2009.5198835","ee":"https://doi.org/10.1109/ICC.2009.5198835","url":"https://dblp.org/rec/conf/icc/RuiHLZYY09"}, "url":"URL#5146988" }, { "@score":"1", "@id":"5146989", "info":{"authors":{"author":[{"@pid":"63/1161","text":"Daniel J. Ryan"},{"@pid":"07/3441","text":"Iain B. Collings"},{"@pid":"87/6271","text":"Jean-Marc Valin"}]},"title":"Reflected Simplex Codebooks for Limited Feedback MIMO Beamforming.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RyanCV09","doi":"10.1109/ICC.2009.5199405","ee":"https://doi.org/10.1109/ICC.2009.5199405","url":"https://dblp.org/rec/conf/icc/RyanCV09"}, "url":"URL#5146989" }, { "@score":"1", "@id":"5146990", "info":{"authors":{"author":[{"@pid":"71/2058","text":"Sunheui Ryoo"},{"@pid":"72/5261","text":"Saewoong Bahk"}]},"title":"Energy Saving MAC for MIMO Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/RyooB09","doi":"10.1109/ICC.2009.5198994","ee":"https://doi.org/10.1109/ICC.2009.5198994","url":"https://dblp.org/rec/conf/icc/RyooB09"}, "url":"URL#5146990" }, { "@score":"1", "@id":"5146991", "info":{"authors":{"author":[{"@pid":"41/6237","text":"Walid Saad"},{"@pid":"83/514","text":"Zhu Han 0001"},{"@pid":"75/4085","text":"Mérouane Debbah"},{"@pid":"38/2572","text":"Are Hjørungnes"},{"@pid":"b/TamerBasar","text":"Tamer Basar"}]},"title":"A Game-Based Self-Organizing Uplink Tree for VoIP Services in IEEE 802.16j Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SaadHDHB09","doi":"10.1109/ICC.2009.5198608","ee":"https://doi.org/10.1109/ICC.2009.5198608","url":"https://dblp.org/rec/conf/icc/SaadHDHB09"}, "url":"URL#5146991" }, { "@score":"1", "@id":"5146992", "info":{"authors":{"author":[{"@pid":"02/2560","text":"Seyed Mohammad Sajad Sadough"},{"@pid":"54/1976","text":"Pierre Duhamel"}]},"title":"On the Interaction Between Channel Coding and Hierarchical Modulation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SadoughD09","doi":"10.1109/ICC.2009.5199255","ee":"https://doi.org/10.1109/ICC.2009.5199255","url":"https://dblp.org/rec/conf/icc/SadoughD09"}, "url":"URL#5146992" }, { "@score":"1", "@id":"5146993", "info":{"authors":{"author":[{"@pid":"39/6643","text":"Sayed Mohammad Ebrahim Sahraeian"},{"@pid":"49/2825","text":"Mohammad Ali Akhaee"},{"@pid":"06/1232","text":"Farokh Marvasti"}]},"title":"Information Hiding with Optimal Detector for Highly Correlated Signals.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SahraeianAM09","doi":"10.1109/ICC.2009.5199082","ee":"https://doi.org/10.1109/ICC.2009.5199082","url":"https://dblp.org/rec/conf/icc/SahraeianAM09"}, "url":"URL#5146993" }, { "@score":"1", "@id":"5146994", "info":{"authors":{"author":[{"@pid":"41/489","text":"Kazuya Sakai"},{"@pid":"70/2846","text":"Min-Te Sun"},{"@pid":"21/1694","text":"Wei-Shinn Ku"}]},"title":"Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SakaiSK09","doi":"10.1109/ICC.2009.5199026","ee":"https://doi.org/10.1109/ICC.2009.5199026","url":"https://dblp.org/rec/conf/icc/SakaiSK09"}, "url":"URL#5146994" }, { "@score":"1", "@id":"5146995", "info":{"authors":{"author":[{"@pid":"80/3934","text":"Hanan Saleet"},{"@pid":"82/2229","text":"Rami Langar"},{"@pid":"b/OtmanABasir","text":"Otman Basir"},{"@pid":"b/RaoufBoutaba","text":"Raouf Boutaba"}]},"title":"A Distributed Approach for Location Lookup in Vehicular Ad Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SaleetLBB09","doi":"10.1109/ICC.2009.5198596","ee":"https://doi.org/10.1109/ICC.2009.5198596","url":"https://dblp.org/rec/conf/icc/SaleetLBB09"}, "url":"URL#5146995" }, { "@score":"1", "@id":"5146996", "info":{"authors":{"author":[{"@pid":"60/10100","text":"Mohamed A. Rashad Salem"},{"@pid":"14/5978","text":"Abdulkareem Adinoyi"},{"@pid":"35/5870","text":"Mahmudur Rahman"},{"@pid":"30/1545","text":"Halim Yanikomeroglu"},{"@pid":"62/4101","text":"David D. Falconer"},{"@pid":"67/367","text":"Young-Doo Kim"},{"@pid":"77/5412","text":"Wonjae Shin"},{"@pid":"74/7883","text":"Eungsun Kim"}]},"title":"Fairness-Aware Joint Routing and Scheduling in OFDMA-Based Cellular Fixed Relay Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SalemARYFKSK09","doi":"10.1109/ICC.2009.5199024","ee":"https://doi.org/10.1109/ICC.2009.5199024","url":"https://dblp.org/rec/conf/icc/SalemARYFKSK09"}, "url":"URL#5146996" }, { "@score":"1", "@id":"5146997", "info":{"authors":{"author":[{"@pid":"82/7883","text":"Ismail Salhi"},{"@pid":"72/7882","text":"Mohamed Oussama Cherif"},{"@pid":"75/1717","text":"Sidi-Mohammed Senouci"}]},"title":"A New Architecture for Data Collection in Vehicular Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SalhiCS09","doi":"10.1109/ICC.2009.5198637","ee":"https://doi.org/10.1109/ICC.2009.5198637","url":"https://dblp.org/rec/conf/icc/SalhiCS09"}, "url":"URL#5146997" }, { "@score":"1", "@id":"5146998", "info":{"authors":{"author":[{"@pid":"91/7205","text":"Omar S. Salih"},{"@pid":"75/2596","text":"Cheng-Xiang Wang 0001"},{"@pid":"52/5184","text":"David I. Laurenson"}]},"title":"Three Layered Hidden Markov Models for Binary Digital Wireless Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SalihWL09","doi":"10.1109/ICC.2009.5199522","ee":"https://doi.org/10.1109/ICC.2009.5199522","url":"https://dblp.org/rec/conf/icc/SalihWL09"}, "url":"URL#5146998" }, { "@score":"1", "@id":"5146999", "info":{"authors":{"author":[{"@pid":"54/2841","text":"Tarek El Salti"},{"@pid":"56/3197","text":"Nidal Nasser"},{"@pid":"09/3053","text":"Tarik Taleb"}]},"title":"A Set of Topological Graphs for 2-D Sensor Ad Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SaltiNT09","doi":"10.1109/ICC.2009.5198670","ee":"https://doi.org/10.1109/ICC.2009.5198670","url":"https://dblp.org/rec/conf/icc/SaltiNT09"}, "url":"URL#5146999" }, { "@score":"1", "@id":"5147000", "info":{"authors":{"author":{"@pid":"45/170","text":"Iraj Saniee"}},"title":"Decentralized Control and Optimization of Networks with QoS-Constrained Services.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Saniee09","doi":"10.1109/ICC.2009.5198882","ee":"https://doi.org/10.1109/ICC.2009.5198882","url":"https://dblp.org/rec/conf/icc/Saniee09"}, "url":"URL#5147000" }, { "@score":"1", "@id":"5147001", "info":{"authors":{"author":[{"@pid":"65/7881","text":"Saleh Suleman Saraireh"},{"@pid":"98/4523","text":"Mohammed Benaissa"}]},"title":"A Scalable Block Cipher Design Using Filter Banks and Lifting over Finite Fields.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SarairehB09","doi":"10.1109/ICC.2009.5198665","ee":"https://doi.org/10.1109/ICC.2009.5198665","url":"https://dblp.org/rec/conf/icc/SarairehB09"}, "url":"URL#5147001" }, { "@score":"1", "@id":"5147002", "info":{"authors":{"author":[{"@pid":"59/4454","text":"Jahangir H. Sarker"},{"@pid":"217/2530","text":"Hussein T. Mouftah"}]},"title":"Maximizing Throughput with Multiple Power Levels in a Random Access Infrastructure-Less Radio System.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SarkerM09","doi":"10.1109/ICC.2009.5199171","ee":"https://doi.org/10.1109/ICC.2009.5199171","url":"https://dblp.org/rec/conf/icc/SarkerM09"}, "url":"URL#5147002" }, { "@score":"1", "@id":"5147003", "info":{"authors":{"author":[{"@pid":"79/7883","text":"Gabi Sarkis"},{"@pid":"20/1669","text":"Shie Mannor"},{"@pid":"15/860","text":"Warren J. Gross"}]},"title":"Stochastic Decoding of LDPC Codes over GF(q).","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SarkisMG09","doi":"10.1109/ICC.2009.5199493","ee":"https://doi.org/10.1109/ICC.2009.5199493","url":"https://dblp.org/rec/conf/icc/SarkisMG09"}, "url":"URL#5147003" }, { "@score":"1", "@id":"5147004", "info":{"authors":{"author":[{"@pid":"28/7883","text":"Golam Sarwar"},{"@pid":"62/3483","text":"Roksana Boreli"},{"@pid":"27/4587","text":"Emmanuel Lochin"}]},"title":"Performance of VoIP with DCCP for Satellite Links.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SarwarBL09","doi":"10.1109/ICC.2009.5199334","ee":"https://doi.org/10.1109/ICC.2009.5199334","url":"https://dblp.org/rec/conf/icc/SarwarBL09"}, "url":"URL#5147004" }, { "@score":"1", "@id":"5147005", "info":{"authors":{"author":[{"@pid":"44/5298","text":"Daisuke Satoh"},{"@pid":"00/7883","text":"Kyoko Ashitagawa"}]},"title":"SIP Network Design to Prevent Congestion Caused by Disaster.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SatohA09","doi":"10.1109/ICC.2009.5199461","ee":"https://doi.org/10.1109/ICC.2009.5199461","url":"https://dblp.org/rec/conf/icc/SatohA09"}, "url":"URL#5147005" }, { "@score":"1", "@id":"5147006", "info":{"authors":{"author":[{"@pid":"30/7213","text":"Samir Sayed"},{"@pid":"48/450-1","text":"Yang Yang 0001"},{"@pid":"96/5737","text":"Honglin Hu"}]},"title":"CARD: Cooperative Access with Relay's Data for Multi-Rate Wireless Local Area Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SayedYH09","doi":"10.1109/ICC.2009.5198810","ee":"https://doi.org/10.1109/ICC.2009.5198810","url":"https://dblp.org/rec/conf/icc/SayedYH09"}, "url":"URL#5147006" }, { "@score":"1", "@id":"5147007", "info":{"authors":{"author":[{"@pid":"88/3575","text":"Aubrey-Derrick Schmidt"},{"@pid":"25/6921","text":"Rainer Bye"},{"@pid":"03/808","text":"Hans-Gunther Schmidt"},{"@pid":"28/7881","text":"Jan Hendrik Clausen"},{"@pid":"35/7884","text":"Osman Kiraz"},{"@pid":"63/7848","text":"Kamer Ali Yüksel"},{"@pid":"55/3548","text":"Seyit Ahmet Çamtepe"},{"@pid":"a/SahinAlbayrak","text":"Sahin Albayrak"}]},"title":"Static Analysis of Executables for Collaborative Malware Detection on Android.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SchmidtBSCKYCA09","doi":"10.1109/ICC.2009.5199486","ee":"https://doi.org/10.1109/ICC.2009.5199486","url":"https://dblp.org/rec/conf/icc/SchmidtBSCKYCA09"}, "url":"URL#5147007" }, { "@score":"1", "@id":"5147008", "info":{"authors":{"author":[{"@pid":"23/3756","text":"Samir Sebbah"},{"@pid":"58/5281","text":"Brigitte Jaumard"}]},"title":"A Resilient Transparent Optical Network Design with a Pre-Configured Extended-Tree Scheme.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SebbahJ09","doi":"10.1109/ICC.2009.5198662","ee":"https://doi.org/10.1109/ICC.2009.5198662","url":"https://dblp.org/rec/conf/icc/SebbahJ09"}, "url":"URL#5147008" }, { "@score":"1", "@id":"5147009", "info":{"authors":{"author":[{"@pid":"30/3017","text":"Martin Senst"},{"@pid":"02/5336","text":"Gerd Ascheid"}]},"title":"Optimal Output Back-Off in OFDM Systems with Nonlinear Power Amplifiers.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SenstA09","doi":"10.1109/ICC.2009.5199282","ee":"https://doi.org/10.1109/ICC.2009.5199282","url":"https://dblp.org/rec/conf/icc/SenstA09"}, "url":"URL#5147009" }, { "@score":"1", "@id":"5147010", "info":{"authors":{"author":[{"@pid":"24/7884","text":"Simone Sergi"},{"@pid":"15/180","text":"Fabrizio Pancaldi"},{"@pid":"29/2166","text":"Giorgio Matteo Vitetta"}]},"title":"Cooperative Communication Techniques for Wireless OFDMA-Based Ad-Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SergiPV09","doi":"10.1109/ICC.2009.5198859","ee":"https://doi.org/10.1109/ICC.2009.5198859","url":"https://dblp.org/rec/conf/icc/SergiPV09"}, "url":"URL#5147010" }, { "@score":"1", "@id":"5147011", "info":{"authors":{"author":[{"@pid":"24/7884","text":"Simone Sergi"},{"@pid":"15/180","text":"Fabrizio Pancaldi"},{"@pid":"29/2166","text":"Giorgio Matteo Vitetta"}]},"title":"A Game Theory Approach to Selection Diversity in Wireless Ad-Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SergiPV09a","doi":"10.1109/ICC.2009.5198607","ee":"https://doi.org/10.1109/ICC.2009.5198607","url":"https://dblp.org/rec/conf/icc/SergiPV09a"}, "url":"URL#5147011" }, { "@score":"1", "@id":"5147012", "info":{"authors":{"author":[{"@pid":"95/7883","text":"Ankit Sethi"},{"@pid":"87/4995","text":"Prasanna Chaporkar"},{"@pid":"49/5720","text":"Abhay Karandikar"}]},"title":"Power Optimal Signaling for Fading Multi-Access Channel in Presence of Coding Gap.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SethiCK09","doi":"10.1109/ICC.2009.5199352","ee":"https://doi.org/10.1109/ICC.2009.5199352","url":"https://dblp.org/rec/conf/icc/SethiCK09"}, "url":"URL#5147012" }, { "@score":"1", "@id":"5147013", "info":{"authors":{"author":[{"@pid":"23/5198","text":"Hamed Shah-Mansouri"},{"@pid":"59/1337","text":"Mohammad Reza Pakravan"}]},"title":"An Upper Bound on the Performance of Non-Repetitive Flooding over CSMA in Wireless Ad-Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Shah-MansouriP09","doi":"10.1109/ICC.2009.5198741","ee":"https://doi.org/10.1109/ICC.2009.5198741","url":"https://dblp.org/rec/conf/icc/Shah-MansouriP09"}, "url":"URL#5147013" }, { "@score":"1", "@id":"5147014", "info":{"authors":{"author":[{"@pid":"40/7413","text":"Virag Shah"},{"@pid":"59/3422","text":"Neelesh B. Mehta"},{"@pid":"63/3806","text":"Raymond Yim"}]},"title":"Analysis, Insights and Generalization of a Fast Decentralized Relay Selection Mechanism.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ShahMY09","doi":"10.1109/ICC.2009.5198748","ee":"https://doi.org/10.1109/ICC.2009.5198748","url":"https://dblp.org/rec/conf/icc/ShahMY09"}, "url":"URL#5147014" }, { "@score":"1", "@id":"5147015", "info":{"authors":{"author":[{"@pid":"19/4339","text":"Abu Zafar M. Shahriar"},{"@pid":"a/MAtiquzzaman","text":"Mohammed Atiquzzaman"}]},"title":"Evaluation of Prefix Delegation-Based Route Optimization Schemes for NEMO.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ShahriarA09","doi":"10.1109/ICC.2009.5199009","ee":"https://doi.org/10.1109/ICC.2009.5199009","url":"https://dblp.org/rec/conf/icc/ShahriarA09"}, "url":"URL#5147015" }, { "@score":"1", "@id":"5147016", "info":{"authors":{"author":[{"@pid":"96/3813","text":"Hangguan Shan"},{"@pid":"z/WeihuaZhuang","text":"Weihua Zhuang"},{"@pid":"90/3280","text":"Zongxin Wang"}]},"title":"Cooperation or Not in Mobile Ad Hoc Networks: A MAC Perspective.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ShanZW09","doi":"10.1109/ICC.2009.5198856","ee":"https://doi.org/10.1109/ICC.2009.5198856","url":"https://dblp.org/rec/conf/icc/ShanZW09"}, "url":"URL#5147016" }, { "@score":"1", "@id":"5147017", "info":{"authors":{"author":[{"@pid":"44/468","text":"Hua Shao"},{"@pid":"62/6601","text":"Norman C. Beaulieu"}]},"title":"Statistical Analysis of Multiple Access Interference in Asynchronous UWB Impulse Radio.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ShaoB09","doi":"10.1109/ICC.2009.5199488","ee":"https://doi.org/10.1109/ICC.2009.5199488","url":"https://dblp.org/rec/conf/icc/ShaoB09"}, "url":"URL#5147017" }, { "@score":"1", "@id":"5147018", "info":{"authors":{"author":[{"@pid":"59/7882","text":"Xiaoying Shao"},{"@pid":"01/7882","text":"Roel Schiphorst"},{"@pid":"s/KeesSlump","text":"Cornelis H. Slump"}]},"title":"Energy Efficient Error Correction in Mobile TV.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ShaoSS09","doi":"10.1109/ICC.2009.5198991","ee":"https://doi.org/10.1109/ICC.2009.5198991","url":"https://dblp.org/rec/conf/icc/ShaoSS09"}, "url":"URL#5147018" }, { "@score":"1", "@id":"5147019", "info":{"authors":{"author":[{"@pid":"70/5713","text":"G. V. V. Sharma"},{"@pid":"20/4943","text":"Vijay Ganwani"},{"@pid":"57/3280","text":"Uday B. Desai"},{"@pid":"m/SNMerchant","text":"S. N. Merchant"}]},"title":"Performance Analysis of Maximum Likelihood Decode and Forward Cooperative Systems in Rayleigh Fading.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SharmaGDM09","doi":"10.1109/ICC.2009.5199310","ee":"https://doi.org/10.1109/ICC.2009.5199310","url":"https://dblp.org/rec/conf/icc/SharmaGDM09"}, "url":"URL#5147019" }, { "@score":"1", "@id":"5147020", "info":{"authors":{"author":[{"@pid":"13/6963","text":"Farnaz Shayegh"},{"@pid":"86/1647","text":"M. Reza Soleymani"}]},"title":"A Low Complexity Iterative Technique for Soft Decision Decoding of Reed-Solomon Codes.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ShayeghS09","doi":"10.1109/ICC.2009.5198625","ee":"https://doi.org/10.1109/ICC.2009.5198625","url":"https://dblp.org/rec/conf/icc/ShayeghS09"}, "url":"URL#5147020" }, { "@score":"1", "@id":"5147021", "info":{"authors":{"author":[{"@pid":"54/703","text":"Feng She"},{"@pid":"36/6699-1","text":"Wen Chen 0001"},{"@pid":"99/5168-1","text":"Hanwen Luo 0001"},{"@pid":"49/7883","text":"Tingshan Huang"},{"@pid":"96/1149","text":"Xinbing Wang"}]},"title":"Joint Power Allocation and Scheduling of Multi-Antenna OFDM System in Broadcast Channel.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SheCLHW09","doi":"10.1109/ICC.2009.5199118","ee":"https://doi.org/10.1109/ICC.2009.5199118","url":"https://dblp.org/rec/conf/icc/SheCLHW09"}, "url":"URL#5147021" }, { "@score":"1", "@id":"5147022", "info":{"authors":{"author":[{"@pid":"48/4825-1","text":"Chao Shen 0001"},{"@pid":"05/7884","text":"Zhongmin Cai"},{"@pid":"45/503","text":"Xiaohong Guan"},{"@pid":"37/7884","text":"Huilan Sha"},{"@pid":"51/7883","text":"Jingzi Du"}]},"title":"Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ShenCGSD09","doi":"10.1109/ICC.2009.5199032","ee":"https://doi.org/10.1109/ICC.2009.5199032","url":"https://dblp.org/rec/conf/icc/ShenCGSD09"}, "url":"URL#5147022" }, { "@score":"1", "@id":"5147023", "info":{"authors":{"author":[{"@pid":"55/3503","text":"Zhengguo Sheng"},{"@pid":"64/361-1","text":"Zhiguo Ding 0001"},{"@pid":"04/2707","text":"Kin K. Leung"}]},"title":"Interference Subtraction with Supplementary Cooperation in Wireless Cooperative Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ShengDL09","doi":"10.1109/ICC.2009.5199094","ee":"https://doi.org/10.1109/ICC.2009.5199094","url":"https://dblp.org/rec/conf/icc/ShengDL09"}, "url":"URL#5147023" }, { "@score":"1", "@id":"5147024", "info":{"authors":{"author":[{"@pid":"55/3503","text":"Zhengguo Sheng"},{"@pid":"64/361-1","text":"Zhiguo Ding 0001"},{"@pid":"04/2707","text":"Kin K. Leung"}]},"title":"Distributed and Power Efficient Routing in Wireless Cooperative Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ShengDL09a","doi":"10.1109/ICC.2009.5198920","ee":"https://doi.org/10.1109/ICC.2009.5198920","url":"https://dblp.org/rec/conf/icc/ShengDL09a"}, "url":"URL#5147024" }, { "@score":"1", "@id":"5147025", "info":{"authors":{"author":[{"@pid":"15/4696","text":"Shakti Prasad Shenoy"},{"@pid":"33/4907","text":"Irfan Ghauri"},{"@pid":"57/1614","text":"Dirk T. M. Slock"}]},"title":"Multiuser Extensions for Closed Loop Transmit Diversity in HSDPA.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ShenoyGS09","doi":"10.1109/ICC.2009.5199209","ee":"https://doi.org/10.1109/ICC.2009.5199209","url":"https://dblp.org/rec/conf/icc/ShenoyGS09"}, "url":"URL#5147025" }, { "@score":"1", "@id":"5147026", "info":{"authors":{"author":[{"@pid":"29/563-8","text":"Lei Shi 0008"},{"@pid":"64/1049-3","text":"Jing Fu 0003"},{"@pid":"33/4231","text":"Xiaoming Fu 0001"}]},"title":"Loop-Free Forwarding Table Updates with Minimal Link Overflow.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ShiFF09","doi":"10.1109/ICC.2009.5199146","ee":"https://doi.org/10.1109/ICC.2009.5199146","url":"https://dblp.org/rec/conf/icc/ShiFF09"}, "url":"URL#5147026" }, { "@score":"1", "@id":"5147027", "info":{"authors":{"author":[{"@pid":"04/5868","text":"Cuizhu Shi"},{"@pid":"08/6089","text":"Aditya Ramamoorthy"}]},"title":"Design and Analysis of E2 RC Codes Using EXIT Chart.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ShiR09","doi":"10.1109/ICC.2009.5198897","ee":"https://doi.org/10.1109/ICC.2009.5198897","url":"https://dblp.org/rec/conf/icc/ShiR09"}, "url":"URL#5147027" }, { "@score":"1", "@id":"5147028", "info":{"authors":{"author":[{"@pid":"70/1845","text":"Changxin Shi"},{"@pid":"s/DavidASchmidt","text":"David A. Schmidt"},{"@pid":"b/RandallBerry","text":"Randall A. Berry"},{"@pid":"h/MichaelLHonig","text":"Michael L. Honig"},{"@pid":"34/5115","text":"Wolfgang Utschick"}]},"title":"Distributed Interference Pricing for the MIMO Interference Channel.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ShiSBHU09","doi":"10.1109/ICC.2009.5198927","ee":"https://doi.org/10.1109/ICC.2009.5198927","url":"https://dblp.org/rec/conf/icc/ShiSBHU09"}, "url":"URL#5147028" }, { "@score":"1", "@id":"5147029", "info":{"authors":{"author":[{"@pid":"49/407","text":"Yusuke Shinohara"},{"@pid":"58/2132","text":"Hideyuki Shimonishi"},{"@pid":"30/3255","text":"Hideki Tode"},{"@pid":"90/4990","text":"Koso Murakami"}]},"title":"Programmable and Scalable Per-Flow Traffic Management Scheme Using a Control Server.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ShinoharaSTM09","doi":"10.1109/ICC.2009.5199370","ee":"https://doi.org/10.1109/ICC.2009.5199370","url":"https://dblp.org/rec/conf/icc/ShinoharaSTM09"}, "url":"URL#5147029" }, { "@score":"1", "@id":"5147030", "info":{"authors":{"author":[{"@pid":"66/5330","text":"Craig A. Shue"},{"@pid":"59/2038","text":"Minaxi Gupta"}]},"title":"Sensitive Data Requests: Do Sites Ask Correctly?","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ShueG09","doi":"10.1109/ICC.2009.5199450","ee":"https://doi.org/10.1109/ICC.2009.5199450","url":"https://dblp.org/rec/conf/icc/ShueG09"}, "url":"URL#5147030" }, { "@score":"1", "@id":"5147031", "info":{"authors":{"author":[{"@pid":"93/7882","text":"Jiangbo Si"},{"@pid":"11/3140-1","text":"Zan Li 0001"},{"@pid":"97/7882","text":"Zeng-Ji Liu"},{"@pid":"20/3215-2","text":"Xiaojun Chen 0002"}]},"title":"Energy Efficient Cooperative Broadcasting in Wireless Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SiLLC09","doi":"10.1109/ICC.2009.5198990","ee":"https://doi.org/10.1109/ICC.2009.5198990","url":"https://dblp.org/rec/conf/icc/SiLLC09"}, "url":"URL#5147031" }, { "@score":"1", "@id":"5147032", "info":{"authors":{"author":[{"@pid":"29/1507","text":"Pengbo Si"},{"@pid":"16/6654","text":"F. Richard Yu"},{"@pid":"83/2179-1","text":"Hong Ji 0001"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Distributed Multi-Source Transmission in Wireless Mobile Peer-to-Peer Networks: A Restless Bandit Approach.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SiYJL09","doi":"10.1109/ICC.2009.5198929","ee":"https://doi.org/10.1109/ICC.2009.5198929","url":"https://dblp.org/rec/conf/icc/SiYJL09"}, "url":"URL#5147032" }, { "@score":"1", "@id":"5147033", "info":{"authors":{"author":[{"@pid":"29/1507","text":"Pengbo Si"},{"@pid":"16/6654","text":"F. Richard Yu"},{"@pid":"83/2179-1","text":"Hong Ji 0001"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Optimal Network Selection in Heterogeneous Wireless Multimedia Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SiYJL09a","doi":"10.1109/ICC.2009.5199281","ee":"https://doi.org/10.1109/ICC.2009.5199281","url":"https://dblp.org/rec/conf/icc/SiYJL09a"}, "url":"URL#5147033" }, { "@score":"1", "@id":"5147034", "info":{"authors":{"author":[{"@pid":"08/187","text":"Sinan Sinanovic"},{"@pid":"94/7881","text":"Harald Burchardt"},{"@pid":"71/5482","text":"Nikola Serafimovski"},{"@pid":"35/1027","text":"Gunther Auer"},{"@pid":"12/2168","text":"Harald Haas"}]},"title":"Local Information Busy Burst Thresholding.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SinanovicBSAH09","doi":"10.1109/ICC.2009.5199142","ee":"https://doi.org/10.1109/ICC.2009.5199142","url":"https://dblp.org/rec/conf/icc/SinanovicBSAH09"}, "url":"URL#5147034" }, { "@score":"1", "@id":"5147035", "info":{"authors":{"author":[{"@pid":"91/7882","text":"Kathiravetpillai Sivanesan"},{"@pid":"00/3314","text":"Junfeng Xiao"},{"@pid":"43/3601","text":"Rose Qingyang Hu"},{"@pid":"44/7883","text":"Geng Wu"}]},"title":"Code Book Based CL-MIMO for DL Wimax Rel. 1.5: System Level Performance Analysis.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SivanesanXHW09","doi":"10.1109/ICC.2009.5198828","ee":"https://doi.org/10.1109/ICC.2009.5198828","url":"https://dblp.org/rec/conf/icc/SivanesanXHW09"}, "url":"URL#5147035" }, { "@score":"1", "@id":"5147036", "info":{"authors":{"author":[{"@pid":"07/6408","text":"Kyle Smith"},{"@pid":"a/EhabAlShaer","text":"Ehab Al-Shaer"},{"@pid":"48/3166","text":"Khalid Elbadawi"}]},"title":"Information Theoretic Approach for Characterizing Spam Botnets Based on Traffic Properties.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SmithAE09","doi":"10.1109/ICC.2009.5199083","ee":"https://doi.org/10.1109/ICC.2009.5199083","url":"https://dblp.org/rec/conf/icc/SmithAE09"}, "url":"URL#5147036" }, { "@score":"1", "@id":"5147037", "info":{"authors":{"author":[{"@pid":"47/3219","text":"David B. Smith 0001"},{"@pid":"23/404","text":"Leif Hanlen"},{"@pid":"07/314-a","text":"Jian (Andrew) Zhang"},{"@pid":"96/7882","text":"Dino Miniutti"},{"@pid":"66/7881","text":"David Rodda"},{"@pid":"00/7881","text":"Ben Gilbert"}]},"title":"Characterization of the Dynamic Narrowband On-Body to Off-Body Area Channel.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SmithHZMRG09","doi":"10.1109/ICC.2009.5198824","ee":"https://doi.org/10.1109/ICC.2009.5198824","url":"https://dblp.org/rec/conf/icc/SmithHZMRG09"}, "url":"URL#5147037" }, { "@score":"1", "@id":"5147038", "info":{"authors":{"author":[{"@pid":"02/270","text":"Craig Smith"},{"@pid":"11/2732","text":"Ashraf Matrawy"}]},"title":"A Behaviour Study of Network-Aware Stealthy Worms.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SmithM09","doi":"10.1109/ICC.2009.5198577","ee":"https://doi.org/10.1109/ICC.2009.5198577","url":"https://dblp.org/rec/conf/icc/SmithM09"}, "url":"URL#5147038" }, { "@score":"1", "@id":"5147039", "info":{"authors":{"author":[{"@pid":"60/7822","text":"Harold H. Sneessens"},{"@pid":"v/LucVandendorpe","text":"Luc Vandendorpe"},{"@pid":"35/4573","text":"J. Nicholas Laneman"}]},"title":"Adaptive Compress-and-Forward Relaying in Fading Environments with or without Wyner-Ziv Coding.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SneessensVL09","doi":"10.1109/ICC.2009.5198699","ee":"https://doi.org/10.1109/ICC.2009.5198699","url":"https://dblp.org/rec/conf/icc/SneessensVL09"}, "url":"URL#5147039" }, { "@score":"1", "@id":"5147040", "info":{"authors":{"author":[{"@pid":"59/5805","text":"Mark E. Snyder"},{"@pid":"s/RaviSundaram","text":"Ravi Sundaram"},{"@pid":"58/5492","text":"Mayur Thakur"}]},"title":"Preprocessing DNS Log Data for Effective Data Mining.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SnyderST09","doi":"10.1109/ICC.2009.5199359","ee":"https://doi.org/10.1109/ICC.2009.5199359","url":"https://dblp.org/rec/conf/icc/SnyderST09"}, "url":"URL#5147040" }, { "@score":"1", "@id":"5147041", "info":{"authors":{"author":[{"@pid":"51/4182","text":"Illsoo Sohn"},{"@pid":"07/361","text":"Chang Soon Park"},{"@pid":"03/3301","text":"Kwang Bok Lee"}]},"title":"Dynamic Channel Feedback Control for Limited-Feedback Multi-User MIMO Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SohnPL09","doi":"10.1109/ICC.2009.5198953","ee":"https://doi.org/10.1109/ICC.2009.5198953","url":"https://dblp.org/rec/conf/icc/SohnPL09"}, "url":"URL#5147041" }, { "@score":"1", "@id":"5147042", "info":{"authors":{"author":[{"@pid":"09/2085-6","text":"Bin Song 0006"},{"@pid":"89/2324","text":"Martin Haardt"}]},"title":"Effects of Imperfect Channel State Information on Achievable Rates of Precoded Multi-User MIMO Broadcast Channels with Limited Feedback.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SongH09","doi":"10.1109/ICC.2009.5198965","ee":"https://doi.org/10.1109/ICC.2009.5198965","url":"https://dblp.org/rec/conf/icc/SongH09"}, "url":"URL#5147042" }, { "@score":"1", "@id":"5147043", "info":{"authors":{"author":[{"@pid":"02/1544","text":"Joo-Han Song"},{"@pid":"54/3080","text":"Vincent W. S. Wong 0001"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SongWL09","doi":"10.1109/ICC.2009.5199575","ee":"https://doi.org/10.1109/ICC.2009.5199575","url":"https://dblp.org/rec/conf/icc/SongWL09"}, "url":"URL#5147043" }, { "@score":"1", "@id":"5147044", "info":{"authors":{"author":[{"@pid":"99/5721-2","text":"Min Song 0002"},{"@pid":"15/7221","text":"Yanxiao Zhao"},{"@pid":"w/JunWang16","text":"Jun Wang 0016"},{"@pid":"p/EKPark","text":"E. K. Park"}]},"title":"A High Throughput Load Balance Algorithm for Multichannel Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SongZWP09","doi":"10.1109/ICC.2009.5198616","ee":"https://doi.org/10.1109/ICC.2009.5198616","url":"https://dblp.org/rec/conf/icc/SongZWP09"}, "url":"URL#5147044" }, { "@score":"1", "@id":"5147045", "info":{"authors":{"author":[{"@pid":"02/2683","text":"Lingyang Song"},{"@pid":"04/3348-2","text":"Yan Zhang 0002"},{"@pid":"91/1334","text":"Rong Yu"},{"@pid":"06/7883","text":"Wenqing Yao"},{"@pid":"28/1726","text":"Zhuo Wu"}]},"title":"Cross-Layer Optimized Routing for Wireless Sensor Networks Using Dynamic Programming.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SongZYYW09","doi":"10.1109/ICC.2009.5198875","ee":"https://doi.org/10.1109/ICC.2009.5198875","url":"https://dblp.org/rec/conf/icc/SongZYYW09"}, "url":"URL#5147045" }, { "@score":"1", "@id":"5147046", "info":{"authors":{"author":[{"@pid":"62/1539","text":"Wei Song"},{"@pid":"z/WeihuaZhuang","text":"Weihua Zhuang"},{"@pid":"04/4784","text":"Dongmei Zhao"}]},"title":"Performance Evaluation of Interactive Data Services Under Sharing and Preemptive Scheduling Disciplines.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SongZZ09","doi":"10.1109/ICC.2009.5199322","ee":"https://doi.org/10.1109/ICC.2009.5199322","url":"https://dblp.org/rec/conf/icc/SongZZ09"}, "url":"URL#5147046" }, { "@score":"1", "@id":"5147047", "info":{"authors":{"author":[{"@pid":"15/7881","text":"Mikael Sørensen"},{"@pid":"69/4359","text":"Pierre Comon"},{"@pid":"88/2403","text":"Sylvie Icart"},{"@pid":"37/524","text":"Luc Deneire"}]},"title":"PARAFAC2 Receivers for Orthogonal Space-Time Block Codes.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SorensenCID09","doi":"10.1109/ICC.2009.5199299","ee":"https://doi.org/10.1109/ICC.2009.5199299","url":"https://dblp.org/rec/conf/icc/SorensenCID09"}, "url":"URL#5147047" }, { "@score":"1", "@id":"5147048", "info":{"authors":{"author":[{"@pid":"78/4102","text":"Beatriz Soret"},{"@pid":"56/1112","text":"M. Carmen Aguayo-Torres"},{"@pid":"82/2284","text":"José T. Entrambasaguas"}]},"title":"Capacity with Probabilistic Delay Constraint for Voice Traffic in a Rayleigh Channel.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SoretAE09","doi":"10.1109/ICC.2009.5198807","ee":"https://doi.org/10.1109/ICC.2009.5198807","url":"https://dblp.org/rec/conf/icc/SoretAE09"}, "url":"URL#5147048" }, { "@score":"1", "@id":"5147049", "info":{"authors":{"author":[{"@pid":"35/266","text":"Christoph Sorge"},{"@pid":"88/6912","text":"Jan Seedorf"}]},"title":"A Provider-Level Reputation System for Assessing the Quality of SPIT Mitigation Algorithms.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SorgeS09","doi":"10.1109/ICC.2009.5198660","ee":"https://doi.org/10.1109/ICC.2009.5198660","url":"https://dblp.org/rec/conf/icc/SorgeS09"}, "url":"URL#5147049" }, { "@score":"1", "@id":"5147050", "info":{"authors":{"author":[{"@pid":"98/1677","text":"Sameh Sorour"},{"@pid":"48/302","text":"Amin Alamdar Yazdi"},{"@pid":"82/3084","text":"Shahrokh Valaee"},{"@pid":"11/6712","text":"Ronny Yongho Kim"}]},"title":"Throughput Improvement through Precoding in OFDMA Systems with Limited Feedback.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SorourYVK09","doi":"10.1109/ICC.2009.5199526","ee":"https://doi.org/10.1109/ICC.2009.5199526","url":"https://dblp.org/rec/conf/icc/SorourYVK09"}, "url":"URL#5147050" }, { "@score":"1", "@id":"5147051", "info":{"authors":{"author":[{"@pid":"24/3174","text":"Oussama Souihli"},{"@pid":"74/1137","text":"Tomoaki Ohtsuki"}]},"title":"The Two-Way MIMO Wire-Tap Channel.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SouihliO09","doi":"10.1109/ICC.2009.5199519","ee":"https://doi.org/10.1109/ICC.2009.5199519","url":"https://dblp.org/rec/conf/icc/SouihliO09"}, "url":"URL#5147051" }, { "@score":"1", "@id":"5147052", "info":{"authors":{"author":[{"@pid":"04/4059","text":"Rausley Adriano Amaral de Souza"},{"@pid":"55/3184","text":"Michel Daoud Yacoub"}]},"title":"Bivariate Nakagami-q (Hoyt) Distribution.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SouzaY09","doi":"10.1109/ICC.2009.5198789","ee":"https://doi.org/10.1109/ICC.2009.5198789","url":"https://dblp.org/rec/conf/icc/SouzaY09"}, "url":"URL#5147052" }, { "@score":"1", "@id":"5147053", "info":{"authors":{"author":[{"@pid":"82/824","text":"Ioannis Spyropoulos"},{"@pid":"64/2524","text":"James R. Zeidler"}]},"title":"A PHY-MAC Cross-Layer Protocol for Ad Hoc Networks with Multiple-Antenna Nodes.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SpyropoulosZ09","doi":"10.1109/ICC.2009.5198658","ee":"https://doi.org/10.1109/ICC.2009.5198658","url":"https://dblp.org/rec/conf/icc/SpyropoulosZ09"}, "url":"URL#5147053" }, { "@score":"1", "@id":"5147054", "info":{"authors":{"author":[{"@pid":"30/6261","text":"K. Pavan Srinath"},{"@pid":"r/BSundarRajan","text":"B. Sundar Rajan"}]},"title":"A Low ML-Decoding Complexity, High Coding Gain, Full-Rate, Full-Diversity STBC for 4 × 2 MIMO System.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SrinathR09","doi":"10.1109/ICC.2009.5198626","ee":"https://doi.org/10.1109/ICC.2009.5198626","url":"https://dblp.org/rec/conf/icc/SrinathR09"}, "url":"URL#5147054" }, { "@score":"1", "@id":"5147055", "info":{"authors":{"author":[{"@pid":"10/6528","text":"Rade Stanojevic"},{"@pid":"59/4874","text":"Robert Shorten"}]},"title":"Load Balancing vs. Distributed Rate Limiting: An Unifying Framework for Cloud Control.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/StanojevicS09","doi":"10.1109/ICC.2009.5199141","ee":"https://doi.org/10.1109/ICC.2009.5199141","url":"https://dblp.org/rec/conf/icc/StanojevicS09"}, "url":"URL#5147055" }, { "@score":"1", "@id":"5147056", "info":{"authors":{"author":[{"@pid":"37/4517","text":"Stelios Stefanatos"},{"@pid":"34/4046","text":"Nikos Dimitriou"}]},"title":"Downlink OFDMA Resource Allocation Under Partial Channel State Information.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/StefanatosD09","doi":"10.1109/ICC.2009.5198945","ee":"https://doi.org/10.1109/ICC.2009.5198945","url":"https://dblp.org/rec/conf/icc/StefanatosD09"}, "url":"URL#5147056" }, { "@score":"1", "@id":"5147057", "info":{"authors":{"author":[{"@pid":"84/6001","text":"Cedomir Stefanovic"},{"@pid":"61/1697","text":"Dejan Vukobratovic"},{"@pid":"99/3194","text":"Dragana Bajic"}]},"title":"Low-Complexity List-Based Frame Synchronization for LDPC Coded Transmission.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/StefanovicVB09","doi":"10.1109/ICC.2009.5199160","ee":"https://doi.org/10.1109/ICC.2009.5199160","url":"https://dblp.org/rec/conf/icc/StefanovicVB09"}, "url":"URL#5147057" }, { "@score":"1", "@id":"5147058", "info":{"authors":{"author":[{"@pid":"29/1165","text":"Maicon Stihler"},{"@pid":"38/5417","text":"Altair Olivo Santin"},{"@pid":"92/3492","text":"Alcides Calsavara"},{"@pid":"84/2247","text":"Arlindo L. Marcon Jr."}]},"title":"Distributed Usage Control Architecture for Business Coalitions.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/StihlerSCM09","doi":"10.1109/ICC.2009.5198940","ee":"https://doi.org/10.1109/ICC.2009.5198940","url":"https://dblp.org/rec/conf/icc/StihlerSCM09"}, "url":"URL#5147058" }, { "@score":"1", "@id":"5147059", "info":{"authors":{"author":[{"@pid":"18/5566","text":"Ivan Stupia"},{"@pid":"49/5150","text":"Filippo Giannetti"},{"@pid":"43/664","text":"Vincenzo Lottici"},{"@pid":"v/LucVandendorpe","text":"Luc Vandendorpe"},{"@pid":"49/878","text":"Jérôme Louveaux"}]},"title":"BICMB-OFDM Link Resource Adaptation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/StupiaGLVL09","doi":"10.1109/ICC.2009.5198783","ee":"https://doi.org/10.1109/ICC.2009.5198783","url":"https://dblp.org/rec/conf/icc/StupiaGLVL09"}, "url":"URL#5147059" }, { "@score":"1", "@id":"5147060", "info":{"authors":{"author":[{"@pid":"26/5371-7","text":"Hang Su 0007"},{"@pid":"87/1222-5","text":"Xi Zhang 0005"}]},"title":"Throughput-Gain Analysis of Network Coding in Multi-Channel Multi-Radio Wireless Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SuZ09","doi":"10.1109/ICC.2009.5199530","ee":"https://doi.org/10.1109/ICC.2009.5199530","url":"https://dblp.org/rec/conf/icc/SuZ09"}, "url":"URL#5147060" }, { "@score":"1", "@id":"5147061", "info":{"authors":{"author":[{"@pid":"53/7881","text":"Shinya Sugiura"},{"@pid":"34/1910","text":"Sheng Chen 0001"},{"@pid":"92/5955","text":"Lajos Hanzo"}]},"title":"Markov Chain Minimum Bit Error Rate Detection for Multi-Functional MIMO Uplink.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SugiuraCH09","doi":"10.1109/ICC.2009.5199165","ee":"https://doi.org/10.1109/ICC.2009.5199165","url":"https://dblp.org/rec/conf/icc/SugiuraCH09"}, "url":"URL#5147061" }, { "@score":"1", "@id":"5147062", "info":{"authors":{"author":[{"@pid":"83/7532","text":"Ahmed Iyanda Sulyman"},{"@pid":"76/3272","text":"Glen Takahara"},{"@pid":"07/3173","text":"Hossam S. Hassanein"},{"@pid":"46/7532","text":"Maan Kousa"}]},"title":"Multi-Hop Capacity of MIMO-Multiplexing Relaying in WiMAX Mesh Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SulymanTHK09","doi":"10.1109/ICC.2009.5199201","ee":"https://doi.org/10.1109/ICC.2009.5199201","url":"https://dblp.org/rec/conf/icc/SulymanTHK09"}, "url":"URL#5147062" }, { "@score":"1", "@id":"5147063", "info":{"authors":{"author":[{"@pid":"07/993","text":"Chin-Sean Sum"},{"@pid":"54/4165","text":"Zhou Lan"},{"@pid":"94/5452","text":"Ryuhei Funada"},{"@pid":"14/948","text":"Junyi Wang"},{"@pid":"81/1026","text":"Tuncer Baykas"},{"@pid":"28/3158","text":"Mohammad Azizur Rahman"},{"@pid":"58/1585","text":"Hiroshi Harada"},{"@pid":"93/4644","text":"Shuzo Kato"}]},"title":"Virtual Time-Slot Allocation Scheme for Throughput Enhancement in a Millimeter-Wave GBPS WPAN Cross Layer Design.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SumLFWBRHK09","doi":"10.1109/ICC.2009.5199567","ee":"https://doi.org/10.1109/ICC.2009.5199567","url":"https://dblp.org/rec/conf/icc/SumLFWBRHK09"}, "url":"URL#5147063" }, { "@score":"1", "@id":"5147064", "info":{"authors":{"author":[{"@pid":"97/1352","text":"Zhi Sun"},{"@pid":"a/IAAkyildiz","text":"Ian F. Akyildiz"}]},"title":"Underground Wireless Communication Using Magnetic Induction.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SunA09","doi":"10.1109/ICC.2009.5199549","ee":"https://doi.org/10.1109/ICC.2009.5199549","url":"https://dblp.org/rec/conf/icc/SunA09"}, "url":"URL#5147064" }, { "@score":"1", "@id":"5147065", "info":{"authors":{"author":[{"@pid":"35/892","text":"Bo Sun"},{"@pid":"84/3637","text":"Zhenghao Zhang"}]},"title":"Probabilistic Diagnosis of Link Loss Using End-to-End Path Measurements and Maximum Likelihood Estimation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SunZ09","doi":"10.1109/ICC.2009.5199367","ee":"https://doi.org/10.1109/ICC.2009.5199367","url":"https://dblp.org/rec/conf/icc/SunZ09"}, "url":"URL#5147065" }, { "@score":"1", "@id":"5147066", "info":{"authors":{"author":[{"@pid":"24/7628","text":"Sucha Supittayapornpong"},{"@pid":"35/2239","text":"Poompat Saengudomlert"}]},"title":"Joint Flow Control, Routing and Medium Access Control in Random Access Multi-Hop Wireless Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SupittayapornpongS09","doi":"10.1109/ICC.2009.5199113","ee":"https://doi.org/10.1109/ICC.2009.5199113","url":"https://dblp.org/rec/conf/icc/SupittayapornpongS09"}, "url":"URL#5147066" }, { "@score":"1", "@id":"5147067", "info":{"authors":{"author":[{"@pid":"69/3018","text":"Muneyoshi Suzuki"},{"@pid":"81/7882","text":"Katsuya Minami"}]},"title":"Concurrent Heap-Based Network Sort Engine - Toward Enabling Massive and High Speed Per-Flow Queuing.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SuzukiM09","doi":"10.1109/ICC.2009.5198843","ee":"https://doi.org/10.1109/ICC.2009.5198843","url":"https://dblp.org/rec/conf/icc/SuzukiM09"}, "url":"URL#5147067" }, { "@score":"1", "@id":"5147068", "info":{"authors":{"author":[{"@pid":"87/1845","text":"Géza Szabó"},{"@pid":"96/5487","text":"Andras Veres"},{"@pid":"32/5556","text":"Sándor Molnár"}]},"title":"Effects of User Behavior on MMORPG Traffic.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SzaboVM09","doi":"10.1109/ICC.2009.5198966","ee":"https://doi.org/10.1109/ICC.2009.5198966","url":"https://dblp.org/rec/conf/icc/SzaboVM09"}, "url":"URL#5147068" }, { "@score":"1", "@id":"5147069", "info":{"authors":{"author":[{"@pid":"46/7884","text":"Wai-Kit Sze"},{"@pid":"l/WingCheongLau","text":"Wing Cheong Lau"},{"@pid":"60/5534","text":"On-Ching Yue"}]},"title":"Fast RFID Counting under Unreliable Radio Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/SzeLY09","doi":"10.1109/ICC.2009.5199030","ee":"https://doi.org/10.1109/ICC.2009.5199030","url":"https://dblp.org/rec/conf/icc/SzeLY09"}, "url":"URL#5147069" }, { "@score":"1", "@id":"5147070", "info":{"authors":{"author":[{"@pid":"65/2830","text":"Ali Tajer"},{"@pid":"49/5591","text":"Narayan Prasad"},{"@pid":"07/1021-1","text":"Xiaodong Wang 0001"}]},"title":"Distributed Beamforming and Rate Allocation in Multi-Antenna Cognitive Radio Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TajerPW09","doi":"10.1109/ICC.2009.5198921","ee":"https://doi.org/10.1109/ICC.2009.5198921","url":"https://dblp.org/rec/conf/icc/TajerPW09"}, "url":"URL#5147070" }, { "@score":"1", "@id":"5147071", "info":{"authors":{"author":[{"@pid":"63/6987","text":"Kenichi Takizawa"},{"@pid":"41/5037","text":"Takahiro Aoyagi"},{"@pid":"68/3626","text":"Ryuji Kohno"}]},"title":"Channel Modeling and Performance Evaluation on UWB-Based Wireless Body Area Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TakizawaAK09","doi":"10.1109/ICC.2009.5198820","ee":"https://doi.org/10.1109/ICC.2009.5198820","url":"https://dblp.org/rec/conf/icc/TakizawaAK09"}, "url":"URL#5147071" }, { "@score":"1", "@id":"5147072", "info":{"authors":{"author":[{"@pid":"09/3053","text":"Tarik Taleb"},{"@pid":"64/3988","text":"Zubair Md. Fadlullah"},{"@pid":"318/0131","text":"Tetsuya Takahashi"},{"@pid":"81/2392","text":"Ruhai Wang"},{"@pid":"78/1116","text":"Yoshiaki Nemoto"},{"@pid":"19/3059","text":"Nei Kato"}]},"title":"Tailoring ELB for Multi-Layered Satellite Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TalebFTWNK09","doi":"10.1109/ICC.2009.5199508","ee":"https://doi.org/10.1109/ICC.2009.5199508","url":"https://dblp.org/rec/conf/icc/TalebFTWNK09"}, "url":"URL#5147072" }, { "@score":"1", "@id":"5147073", "info":{"authors":{"author":[{"@pid":"43/1810","text":"Wai Pan Tam"},{"@pid":"14/1863","text":"Tat M. Lok"}]},"title":"Rate Allocation for the Multi-Source Downlink Channel with Minimax Optimization.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TamL09","doi":"10.1109/ICC.2009.5199389","ee":"https://doi.org/10.1109/ICC.2009.5199389","url":"https://dblp.org/rec/conf/icc/TamL09"}, "url":"URL#5147073" }, { "@score":"1", "@id":"5147074", "info":{"authors":{"author":[{"@pid":"80/7882","text":"Neelofer Tamboli"},{"@pid":"17/5519","text":"Mohamed F. Younis"}]},"title":"Coverage-Aware Connectivity Restoration in Mobile Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TamboliY09","doi":"10.1109/ICC.2009.5198869","ee":"https://doi.org/10.1109/ICC.2009.5198869","url":"https://dblp.org/rec/conf/icc/TamboliY09"}, "url":"URL#5147074" }, { "@score":"1", "@id":"5147075", "info":{"authors":{"author":[{"@pid":"19/543","text":"Ravi Tandon"},{"@pid":"u/SennurUlukus","text":"Sennur Ulukus"}]},"title":"On the Capacity Region of the Gaussian Multiple Access Channel with Noisy Feedback.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TandonU09","doi":"10.1109/ICC.2009.5199251","ee":"https://doi.org/10.1109/ICC.2009.5199251","url":"https://dblp.org/rec/conf/icc/TandonU09"}, "url":"URL#5147075" }, { "@score":"1", "@id":"5147076", "info":{"authors":{"author":[{"@pid":"70/3828","text":"Suhua Tang"},{"@pid":"48/3054","text":"Ryu Miura"},{"@pid":"43/3354","text":"Sadao Obana"}]},"title":"Distributed Multi-User Scheduling for Improving Throughput of Wireless LAN.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TangMO09","doi":"10.1109/ICC.2009.5198930","ee":"https://doi.org/10.1109/ICC.2009.5198930","url":"https://dblp.org/rec/conf/icc/TangMO09"}, "url":"URL#5147076" }, { "@score":"1", "@id":"5147077", "info":{"authors":{"author":[{"@pid":"19/6878","text":"Tomohiko Taniguchi"},{"@pid":"75/2917","text":"Nordin Bin Ramli"},{"@pid":"19/4300","text":"Yoshio Karasawa"}]},"title":"Subband Adaptive Array with Reduced Pilot Signal Using Maximal Ratio Combining Scheme.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TaniguchiRK09","doi":"10.1109/ICC.2009.5199494","ee":"https://doi.org/10.1109/ICC.2009.5199494","url":"https://dblp.org/rec/conf/icc/TaniguchiRK09"}, "url":"URL#5147077" }, { "@score":"1", "@id":"5147078", "info":{"authors":{"author":[{"@pid":"78/3721","text":"Hrishikesh Tapse"},{"@pid":"54/5101","text":"Deva K. Borah"}]},"title":"Analysis of Turbo Codes over Hybrid Optical/RF Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TapseB09","doi":"10.1109/ICC.2009.5198747","ee":"https://doi.org/10.1109/ICC.2009.5198747","url":"https://dblp.org/rec/conf/icc/TapseB09"}, "url":"URL#5147078" }, { "@score":"1", "@id":"5147079", "info":{"authors":{"author":[{"@pid":"78/7882","text":"Midori Terasawa"},{"@pid":"09/7199","text":"Masahiro Nishida"},{"@pid":"75/3996","text":"Sho Shimizu"},{"@pid":"02/6139","text":"Yutaka Arakawa"},{"@pid":"60/3681","text":"Satoru Okamoto"},{"@pid":"09/2593","text":"Naoaki Yamanaka"}]},"title":"Recover-Forwarding Method in Link Failure with Pre-Established Recovery Table for Wide Area Ethernet.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TerasawaNSAOY09","doi":"10.1109/ICC.2009.5199398","ee":"https://doi.org/10.1109/ICC.2009.5199398","url":"https://dblp.org/rec/conf/icc/TerasawaNSAOY09"}, "url":"URL#5147079" }, { "@score":"1", "@id":"5147080", "info":{"authors":{"author":[{"@pid":"16/7883","text":"Ravi Thanawala"},{"@pid":"w/JieWu1","text":"Jie Wu 0001"},{"@pid":"74/5221","text":"Avinash Srinivasan"}]},"title":"Efficient Resource Discovery in Mobile Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ThanawalaWS09","doi":"10.1109/ICC.2009.5198978","ee":"https://doi.org/10.1109/ICC.2009.5198978","url":"https://dblp.org/rec/conf/icc/ThanawalaWS09"}, "url":"URL#5147080" }, { "@score":"1", "@id":"5147081", "info":{"authors":{"author":[{"@pid":"64/4022","text":"Fabrice Theoleyre"},{"@pid":"51/2227","text":"Eryk Schiller"},{"@pid":"d/AndrzejDuda","text":"Andrzej Duda"}]},"title":"Efficient Greedy Geographical Non-Planar Routing with Reactive Deflection.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TheoleyreSD09","doi":"10.1109/ICC.2009.5198972","ee":"https://doi.org/10.1109/ICC.2009.5198972","url":"https://dblp.org/rec/conf/icc/TheoleyreSD09"}, "url":"URL#5147081" }, { "@score":"1", "@id":"5147082", "info":{"authors":{"author":[{"@pid":"07/3404","text":"Wim Van Thillo"},{"@pid":"72/4438","text":"Sofie Pollin"},{"@pid":"78/6014","text":"Jimmy Nsenga"},{"@pid":"05/3174","text":"Valéry Ramon"},{"@pid":"29/1532","text":"André Bourdoux"},{"@pid":"87/1391","text":"François Horlin"},{"@pid":"55/5766","text":"Rudy Lauwereins"},{"@pid":"93/1587","text":"Ahmad Bahai"}]},"title":"A Flexible Antenna Selection Scheme for 60 GHz Multi-Antenna Systems Using Interleaved ADCs.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ThilloPNRBHLB09","doi":"10.1109/ICC.2009.5198604","ee":"https://doi.org/10.1109/ICC.2009.5198604","url":"https://dblp.org/rec/conf/icc/ThilloPNRBHLB09"}, "url":"URL#5147082" }, { "@score":"1", "@id":"5147083", "info":{"authors":{"author":[{"@pid":"72/3458","text":"Timothy A. Thomas"},{"@pid":"34/904","text":"William J. Hillery"},{"@pid":"95/5298","text":"James F. Kepler"},{"@pid":"58/750","text":"Vipul Desai"}]},"title":"Estimating Statistical Eigen-Beamforming Gains Using Spatial Channel Correlation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ThomasHKD09","doi":"10.1109/ICC.2009.5199005","ee":"https://doi.org/10.1109/ICC.2009.5199005","url":"https://dblp.org/rec/conf/icc/ThomasHKD09"}, "url":"URL#5147083" }, { "@score":"1", "@id":"5147084", "info":{"authors":{"author":[{"@pid":"94/4625","text":"Preetha Thulasiraman"},{"@pid":"s/XueminShen","text":"Xuemin (Sherman) Shen"}]},"title":"Interference Aware Subcarrier Assignment for Throughput Maximization in OFDMA Wireless Relay Mesh Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ThulasiramanS09","doi":"10.1109/ICC.2009.5199090","ee":"https://doi.org/10.1109/ICC.2009.5199090","url":"https://dblp.org/rec/conf/icc/ThulasiramanS09"}, "url":"URL#5147084" }, { "@score":"1", "@id":"5147085", "info":{"authors":{"author":[{"@pid":"94/1247-1","text":"Chen Tian 0001"},{"@pid":"25/4108-1","text":"Hongbo Jiang 0001"},{"@pid":"207/7109","text":"Xue Liu"},{"@pid":"96/1149","text":"Xinbing Wang"},{"@pid":"42/4110-1","text":"Wenyu Liu 0001"},{"@pid":"17/221-49","text":"Yi Wang 0049"}]},"title":"Tri-Message: A Lightweight Time Synchronization Protocol for High Latency and Resource-Constrained Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TianJLWLW09","doi":"10.1109/ICC.2009.5199544","ee":"https://doi.org/10.1109/ICC.2009.5199544","url":"https://dblp.org/rec/conf/icc/TianJLWLW09"}, "url":"URL#5147085" }, { "@score":"1", "@id":"5147086", "info":{"authors":{"author":[{"@pid":"57/1592-2","text":"Hui Tian 0002"},{"@pid":"78/2949-1","text":"Ke Zhou 0001"},{"@pid":"16/3631-1","text":"Hong Jiang 0001"},{"@pid":"01/2537-17","text":"Jin Liu 0017"},{"@pid":"76/6824-1","text":"Yongfeng Huang 0001"},{"@pid":"48/5939-1","text":"Dan Feng 0001"}]},"title":"An M-Sequence Based Steganography Model for Voice over IP.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TianZJLHF09","doi":"10.1109/ICC.2009.5198737","ee":"https://doi.org/10.1109/ICC.2009.5198737","url":"https://dblp.org/rec/conf/icc/TianZJLHF09"}, "url":"URL#5147086" }, { "@score":"1", "@id":"5147087", "info":{"authors":{"author":[{"@pid":"71/6037","text":"Ke Tian"},{"@pid":"01/986","text":"Baoxian Zhang"},{"@pid":"217/2530","text":"Hussein T. Mouftah"},{"@pid":"88/1293","text":"Zhuang Zhao"},{"@pid":"26/4870-1","text":"Jian Ma 0001"}]},"title":"Destination-Driven On-Demand Multicast Routing Protocol for Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TianZMZM09","doi":"10.1109/ICC.2009.5198907","ee":"https://doi.org/10.1109/ICC.2009.5198907","url":"https://dblp.org/rec/conf/icc/TianZMZM09"}, "url":"URL#5147087" }, { "@score":"1", "@id":"5147088", "info":{"authors":{"author":[{"@pid":"64/7881","text":"Lok Tiing Tie"},{"@pid":"80/7880","text":"Ser Wah Oh"},{"@pid":"01/7814","text":"Karen J. M. Kua"}]},"title":"Efficient Implementation of Binary Sequence Generator for WiMAX and WRAN on Programmable Digital Signal Processor.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TieOK09","doi":"10.1109/ICC.2009.5198974","ee":"https://doi.org/10.1109/ICC.2009.5198974","url":"https://dblp.org/rec/conf/icc/TieOK09"}, "url":"URL#5147088" }, { "@score":"1", "@id":"5147089", "info":{"authors":{"author":[{"@pid":"64/4833","text":"Michael Timmers"},{"@pid":"72/4438","text":"Sofie Pollin"},{"@pid":"93/2764","text":"Antoine Dejonghe"},{"@pid":"45/24","text":"Liesbet Van der Perre"},{"@pid":"61/3302","text":"Francky Catthoor"}]},"title":"A Spatial Learning Algorithm for IEEE 802.11 Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TimmersPDPC09","doi":"10.1109/ICC.2009.5198673","ee":"https://doi.org/10.1109/ICC.2009.5198673","url":"https://dblp.org/rec/conf/icc/TimmersPDPC09"}, "url":"URL#5147089" }, { "@score":"1", "@id":"5147090", "info":{"authors":{"author":[{"@pid":"t/IleniaTinnirello","text":"Ilenia Tinnirello"},{"@pid":"75/2157","text":"Luca Scalia"},{"@pid":"30/7884","text":"Fabio Campoccia"}]},"title":"Improving IEEE 802.11 Performance in Chain Topologies through Distributed Polling and Network Coding.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TinnirelloSC09","doi":"10.1109/ICC.2009.5199076","ee":"https://doi.org/10.1109/ICC.2009.5199076","url":"https://dblp.org/rec/conf/icc/TinnirelloSC09"}, "url":"URL#5147090" }, { "@score":"1", "@id":"5147091", "info":{"authors":{"author":[{"@pid":"54/306","text":"Olav Tirkkonen"},{"@pid":"71/3550","text":"Klaus Hugl"},{"@pid":"20/7884","text":"Yong Teng"}]},"title":"Two-Tx Precoding Codebooks for Variable Spatial Correlation.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TirkkonenHT09","doi":"10.1109/ICC.2009.5199548","ee":"https://doi.org/10.1109/ICC.2009.5199548","url":"https://dblp.org/rec/conf/icc/TirkkonenHT09"}, "url":"URL#5147091" }, { "@score":"1", "@id":"5147092", "info":{"authors":{"author":[{"@pid":"11/7881","text":"Moazzam Islam Tiwana"},{"@pid":"122/8238","text":"Berna Sayraç"},{"@pid":"45/5021","text":"Zwi Altman"}]},"title":"Statistical Learning for Automated RRM: Application to eUTRAN Mobility.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TiwanaSA09","doi":"10.1109/ICC.2009.5199489","ee":"https://doi.org/10.1109/ICC.2009.5199489","url":"https://dblp.org/rec/conf/icc/TiwanaSA09"}, "url":"URL#5147092" }, { "@score":"1", "@id":"5147093", "info":{"authors":{"author":[{"@pid":"40/4038","text":"Alfredo Todini"},{"@pid":"91/6361","text":"Andrea Baiocchi"},{"@pid":"98/7881","text":"Daniele Venturi 0001"}]},"title":"Inadequacy of the Queue-Based Max-Weight Optimal Scheduler on Wireless Links with TCP Sources.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TodiniBV09","doi":"10.1109/ICC.2009.5199080","ee":"https://doi.org/10.1109/ICC.2009.5199080","url":"https://dblp.org/rec/conf/icc/TodiniBV09"}, "url":"URL#5147093" }, { "@score":"1", "@id":"5147094", "info":{"authors":{"author":[{"@pid":"02/1945","text":"Alessandro Tomasoni"},{"@pid":"79/5511","text":"Massimiliano Siti"},{"@pid":"85/5999-1","text":"Marco Ferrari 0001"},{"@pid":"94/5076","text":"Sandro Bellini"}]},"title":"A K-Best Version of the Turbo-LORD MIMO Detector in Realistic Settings.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TomasoniSFB09","doi":"10.1109/ICC.2009.5198618","ee":"https://doi.org/10.1109/ICC.2009.5198618","url":"https://dblp.org/rec/conf/icc/TomasoniSFB09"}, "url":"URL#5147094" }, { "@score":"1", "@id":"5147095", "info":{"authors":{"author":[{"@pid":"60/7004","text":"Patrick Tooher"},{"@pid":"86/1647","text":"M. Reza Soleymani"}]},"title":"Power Allocation for Wireless Communications Using Variable Time-Fraction Collaboration.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TooherS09","doi":"10.1109/ICC.2009.5199349","ee":"https://doi.org/10.1109/ICC.2009.5199349","url":"https://dblp.org/rec/conf/icc/TooherS09"}, "url":"URL#5147095" }, { "@score":"1", "@id":"5147096", "info":{"authors":{"author":{"@pid":"92/108","text":"Filippo Tosato"}},"title":"Near Successive Refinement of Gaussian Vectors in Grassmannian Space.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Tosato09","doi":"10.1109/ICC.2009.5199214","ee":"https://doi.org/10.1109/ICC.2009.5199214","url":"https://dblp.org/rec/conf/icc/Tosato09"}, "url":"URL#5147096" }, { "@score":"1", "@id":"5147097", "info":{"authors":{"author":[{"@pid":"57/2894","text":"Nghi H. Tran"},{"@pid":"41/2926","text":"Tho Le-Ngoc"},{"@pid":"25/1696","text":"Tad Matsumoto"}]},"title":"A Simple Near-Capacity Bandwidth-Efficient Coded Modulation Scheme in Rayleigh Fading.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TranLM09","doi":"10.1109/ICC.2009.5198671","ee":"https://doi.org/10.1109/ICC.2009.5198671","url":"https://dblp.org/rec/conf/icc/TranLM09"}, "url":"URL#5147097" }, { "@score":"1", "@id":"5147098", "info":{"authors":{"author":[{"@pid":"61/970","text":"Le Chung Tran"},{"@pid":"93/2424","text":"Alfred Mertins"}]},"title":"Differential Space-Time-Frequency Codes for MB-OFDM UWB with Dual Carrier Modulation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TranM09","doi":"10.1109/ICC.2009.5198916","ee":"https://doi.org/10.1109/ICC.2009.5198916","url":"https://dblp.org/rec/conf/icc/TranM09"}, "url":"URL#5147098" }, { "@score":"1", "@id":"5147099", "info":{"authors":{"author":[{"@pid":"68/4176","text":"Dionysia Triantafyllopoulou"},{"@pid":"21/4930","text":"Nikos I. Passas"},{"@pid":"47/2107","text":"Alexandros Kaloxylos"}]},"title":"Integration of Handover in a Cross-Layer Mechanism for Mobile Multimedia Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TriantafyllopoulouPK09","doi":"10.1109/ICC.2009.5199085","ee":"https://doi.org/10.1109/ICC.2009.5199085","url":"https://dblp.org/rec/conf/icc/TriantafyllopoulouPK09"}, "url":"URL#5147099" }, { "@score":"1", "@id":"5147100", "info":{"authors":{"author":[{"@pid":"75/1216","text":"Matteo Trivellato"},{"@pid":"21/1554","text":"Nevio Benvenuto"}]},"title":"Cross-Layer Design of Networked Control Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TrivellatoB09","doi":"10.1109/ICC.2009.5198874","ee":"https://doi.org/10.1109/ICC.2009.5198874","url":"https://dblp.org/rec/conf/icc/TrivellatoB09"}, "url":"URL#5147100" }, { "@score":"1", "@id":"5147101", "info":{"authors":{"author":[{"@pid":"77/872","text":"Dmitri V. Truhachev"},{"@pid":"75/2604","text":"Sumeeth Nagaraj"},{"@pid":"s/ChristianSchlegel","text":"Christian Schlegel"}]},"title":"Throughput/Reliability Tradeoffs in Spread Spectrum Multi-Hop Ad-Hoc Wireless Networks with Multi-Packet Detection.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TruhachevNS09","doi":"10.1109/ICC.2009.5199529","ee":"https://doi.org/10.1109/ICC.2009.5199529","url":"https://dblp.org/rec/conf/icc/TruhachevNS09"}, "url":"URL#5147101" }, { "@score":"1", "@id":"5147102", "info":{"authors":{"author":[{"@pid":"79/2406","text":"Óscar Trullols-Cruces"},{"@pid":"34/6502","text":"Julián David Morillo-Pozo"},{"@pid":"54/5791","text":"José M. Barceló"},{"@pid":"15/5654","text":"Jorge García-Vidal"}]},"title":"A Cooperative Vehicular Network Framework.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Trullols-CrucesMBG09","doi":"10.1109/ICC.2009.5198586","ee":"https://doi.org/10.1109/ICC.2009.5198586","url":"https://dblp.org/rec/conf/icc/Trullols-CrucesMBG09"}, "url":"URL#5147102" }, { "@score":"1", "@id":"5147103", "info":{"authors":{"author":[{"@pid":"75/1358","text":"Kien T. Truong"},{"@pid":"220/6991","text":"Steven Weber 0001"},{"@pid":"56/4851","text":"Robert W. Heath Jr."}]},"title":"Transmission Capacity of Two-Way Communication in Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TruongWH09","doi":"10.1109/ICC.2009.5199540","ee":"https://doi.org/10.1109/ICC.2009.5199540","url":"https://dblp.org/rec/conf/icc/TruongWH09"}, "url":"URL#5147103" }, { "@score":"1", "@id":"5147104", "info":{"authors":{"author":[{"@pid":"20/3438","text":"Kostas Tsagkaris"},{"@pid":"40/4773","text":"Nikolaos D. Tselikas"},{"@pid":"26/7881","text":"Nikos Pleros"}]},"title":"A Handover Scheme Based on Moving Extended Cells for 60 GHz Radio-Over-Fiber Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TsagkarisTP09","doi":"10.1109/ICC.2009.5198615","ee":"https://doi.org/10.1109/ICC.2009.5198615","url":"https://dblp.org/rec/conf/icc/TsagkarisTP09"}, "url":"URL#5147104" }, { "@score":"1", "@id":"5147105", "info":{"authors":{"author":[{"@pid":"93/7883","text":"Chia-Hao Tsai"},{"@pid":"76/7881","text":"Tzu-Yi Liao"},{"@pid":"28/3606","text":"Cheng-Yuan Chang"},{"@pid":"25/6603","text":"Guu-chang Yang"},{"@pid":"24/5195","text":"Wing C. Kwong"}]},"title":"Design of Two-Dimensional Wavelength-Time Codes for Fiber-Optic CDMA Systems.","venue":"ICC","pages":"1-4","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TsaiLCYK09","doi":"10.1109/ICC.2009.5198904","ee":"https://doi.org/10.1109/ICC.2009.5198904","url":"https://dblp.org/rec/conf/icc/TsaiLCYK09"}, "url":"URL#5147105" }, { "@score":"1", "@id":"5147106", "info":{"authors":{"author":[{"@pid":"11/3034","text":"Min-Jen Tsai"},{"@pid":"61/1798","text":"Chang-Hsing Shen"},{"@pid":"97/4006","text":"Jung Liu"}]},"title":"Multipurpose Image Watermarking Based on the Wavelet Tree Contrast Level Transformation.","venue":"ICC","pages":"1-4","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TsaiSL09","doi":"10.1109/ICC.2009.5199208","ee":"https://doi.org/10.1109/ICC.2009.5199208","url":"https://dblp.org/rec/conf/icc/TsaiSL09"}, "url":"URL#5147106" }, { "@score":"1", "@id":"5147107", "info":{"authors":{"author":[{"@pid":"69/6610","text":"Dimitrios Tsamis"},{"@pid":"a/TansuAlpcan","text":"Tansu Alpcan"},{"@pid":"s/JatinderPalSingh","text":"Jatinder Pal Singh"},{"@pid":"b/NicholasBambos","text":"Nicholas Bambos"}]},"title":"Dynamic Resource Modeling for Heterogeneous Wireless Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TsamisASB09","doi":"10.1109/ICC.2009.5198962","ee":"https://doi.org/10.1109/ICC.2009.5198962","url":"https://dblp.org/rec/conf/icc/TsamisASB09"}, "url":"URL#5147107" }, { "@score":"1", "@id":"5147108", "info":{"authors":{"author":[{"@pid":"19/154","text":"Huei-Ru Tseng"},{"@pid":"74/1072","text":"Rong-Hong Jan"},{"@pid":"07/1286","text":"Wuu Yang"}]},"title":"A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TsengJY09","doi":"10.1109/ICC.2009.5198581","ee":"https://doi.org/10.1109/ICC.2009.5198581","url":"https://dblp.org/rec/conf/icc/TsengJY09"}, "url":"URL#5147108" }, { "@score":"1", "@id":"5147109", "info":{"authors":{"author":[{"@pid":"71/2561","text":"Paschalis Tsiaflakis"},{"@pid":"01/66","text":"Yung Yi"},{"@pid":"61/5309","text":"Mung Chiang"},{"@pid":"41/6762","text":"Marc Moonen"}]},"title":"Green DSL: Energy-Efficient DSM.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TsiaflakisYCM09","doi":"10.1109/ICC.2009.5199049","ee":"https://doi.org/10.1109/ICC.2009.5199049","url":"https://dblp.org/rec/conf/icc/TsiaflakisYCM09"}, "url":"URL#5147109" }, { "@score":"1", "@id":"5147110", "info":{"authors":{"author":[{"@pid":"29/6900","text":"Daniela Tuninetti"},{"@pid":"23/1616","text":"Songqing Zhao"},{"@pid":"92/1571","text":"Rashid Ansari"},{"@pid":"32/6590","text":"Dan Schonfeld"}]},"title":"The Effect of Fading Correlation on Average Source MMSE Distortion.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/TuninettiZAS09","doi":"10.1109/ICC.2009.5199512","ee":"https://doi.org/10.1109/ICC.2009.5199512","url":"https://dblp.org/rec/conf/icc/TuninettiZAS09"}, "url":"URL#5147110" }, { "@score":"1", "@id":"5147111", "info":{"authors":{"author":[{"@pid":"15/1821","text":"Suleyman Uludag"},{"@pid":"82/5106","text":"Ziyneti Elif Uludag"},{"@pid":"45/3224","text":"Klara Nahrstedt"},{"@pid":"81/5546","text":"King-Shan Lui"},{"@pid":"04/2169","text":"Fred Baker"}]},"title":"A Laplace Transform-Based Method to Stochastic Path Finding.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/UludagUNLB09","doi":"10.1109/ICC.2009.5198619","ee":"https://doi.org/10.1109/ICC.2009.5198619","url":"https://dblp.org/rec/conf/icc/UludagUNLB09"}, "url":"URL#5147111" }, { "@score":"1", "@id":"5147112", "info":{"authors":{"author":[{"@pid":"68/3782","text":"Daisuke Umehara"},{"@pid":"79/5850","text":"Tomoya Hirano"},{"@pid":"81/4645","text":"Satoshi Denno"},{"@pid":"92/4599","text":"Masahiro Morikura"},{"@pid":"64/528","text":"Takatoshi Sugiyama"}]},"title":"Analysis of Network Coding in Slotted ALOHA with Two-Hop Bidirectional Traffic.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/UmeharaHDMS09","doi":"10.1109/ICC.2009.5305934","ee":"https://doi.org/10.1109/ICC.2009.5305934","url":"https://dblp.org/rec/conf/icc/UmeharaHDMS09"}, "url":"URL#5147112" }, { "@score":"1", "@id":"5147113", "info":{"authors":{"author":[{"@pid":"44/77","text":"Shigeo Urushidani"},{"@pid":"66/1199","text":"Kensuke Fukuda"},{"@pid":"53/4376","text":"Yusheng Ji"},{"@pid":"66/4132","text":"Michihiro Koibuchi"},{"@pid":"81/2689","text":"Shunji Abe"},{"@pid":"12/5445","text":"Motonori Nakamura"},{"@pid":"18/6920","text":"Shigeki Yamada"},{"@pid":"14/5272","text":"Kaori Shimizu"},{"@pid":"72/691","text":"Rie Hayashi"},{"@pid":"34/2139","text":"Ichiro Inoue"},{"@pid":"06/3599","text":"Kohei Shiomoto"}]},"title":"Implementation and Evaluation of Layer-1 Bandwidth-on-Demand Capabilities in SINET3.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/UrushidaniFJKANYSHIS09","doi":"10.1109/ICC.2009.5199068","ee":"https://doi.org/10.1109/ICC.2009.5199068","url":"https://dblp.org/rec/conf/icc/UrushidaniFJKANYSHIS09"}, "url":"URL#5147113" }, { "@score":"1", "@id":"5147114", "info":{"authors":{"author":[{"@pid":"03/7282","text":"Thomas Ussmüller"},{"@pid":"93/1816","text":"Robert Weigel"},{"@pid":"84/550","text":"Ralf Eickhoff"}]},"title":"Highly Integrated Fractional-n Synthesizer for Locatable Wireless Sensor Nodes.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/UssmullerWE09","doi":"10.1109/ICC.2009.5199053","ee":"https://doi.org/10.1109/ICC.2009.5199053","url":"https://dblp.org/rec/conf/icc/UssmullerWE09"}, "url":"URL#5147114" }, { "@score":"1", "@id":"5147115", "info":{"authors":{"author":[{"@pid":"51/5843","text":"Vo Tam Van"},{"@pid":"13/1267","text":"Hajime Matsui"},{"@pid":"02/1627","text":"Seiichi Mita"}]},"title":"Low Complexity Encoder for Generalized Quasi-Cyclic Codes Coming from Finite Geometries.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/VanMM09","doi":"10.1109/ICC.2009.5199152","ee":"https://doi.org/10.1109/ICC.2009.5199152","url":"https://dblp.org/rec/conf/icc/VanMM09"}, "url":"URL#5147115" }, { "@score":"1", "@id":"5147116", "info":{"authors":{"author":[{"@pid":"v/LucVandendorpe","text":"Luc Vandendorpe"},{"@pid":"49/878","text":"Jérôme Louveaux"},{"@pid":"15/887","text":"Onur Oguz"},{"@pid":"07/3113","text":"Abdellatif Zaidi"}]},"title":"Power Allocation for Improved DF Relayed OFDM Transmission: The Individual Power Constraint Case.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/VandendorpeLOZ09","doi":"10.1109/ICC.2009.5199347","ee":"https://doi.org/10.1109/ICC.2009.5199347","url":"https://dblp.org/rec/conf/icc/VandendorpeLOZ09"}, "url":"URL#5147116" }, { "@score":"1", "@id":"5147117", "info":{"authors":{"author":[{"@pid":"35/7882","text":"Aharon Vargas"},{"@pid":"31/6279","text":"Marco Breiling"},{"@pid":"57/5273","text":"Wolfgang H. Gerstacker"}]},"title":"Design and Evaluation of a Multilevel Decoder for Satellite Communications.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/VargasBG09","doi":"10.1109/ICC.2009.5198899","ee":"https://doi.org/10.1109/ICC.2009.5198899","url":"https://dblp.org/rec/conf/icc/VargasBG09"}, "url":"URL#5147117" }, { "@score":"1", "@id":"5147118", "info":{"authors":{"author":[{"@pid":"14/3381","text":"T. Venkatesh"},{"@pid":"47/9673","text":"Y. V. Kiran"},{"@pid":"78/4000","text":"C. Siva Ram Murthy"}]},"title":"Joint Path and Wavelength Selection Using Q-learning in Optical Burst Switching Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/VenkateshKM09","doi":"10.1109/ICC.2009.5199117","ee":"https://doi.org/10.1109/ICC.2009.5199117","url":"https://dblp.org/rec/conf/icc/VenkateshKM09"}, "url":"URL#5147118" }, { "@score":"1", "@id":"5147119", "info":{"authors":{"author":[{"@pid":"80/7399","text":"Marzieh Veyseh"},{"@pid":"g/JJGarciaLunaAceves","text":"J. J. Garcia-Luna-Aceves"},{"@pid":"14/4619","text":"Hamid R. Sadjadpour"}]},"title":"OFDMA Based Multiparty Medium Access Control in Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/VeysehGS09","doi":"10.1109/ICC.2009.5199230","ee":"https://doi.org/10.1109/ICC.2009.5199230","url":"https://dblp.org/rec/conf/icc/VeysehGS09"}, "url":"URL#5147119" }, { "@score":"1", "@id":"5147120", "info":{"authors":{"author":[{"@pid":"52/2744","text":"Javier Vía"},{"@pid":"63/7883","text":"Victor Elvira"},{"@pid":"15/2277","text":"Ignacio Santamaría"},{"@pid":"84/550","text":"Ralf Eickhoff"}]},"title":"Analog Antenna Combining for Maximum Capacity Under OFDM Transmissions.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ViaESE09","doi":"10.1109/ICC.2009.5198742","ee":"https://doi.org/10.1109/ICC.2009.5198742","url":"https://dblp.org/rec/conf/icc/ViaESE09"}, "url":"URL#5147120" }, { "@score":"1", "@id":"5147121", "info":{"authors":{"author":[{"@pid":"25/1787","text":"Nam H. Vien"},{"@pid":"55/1768-1","text":"Ha H. Nguyen 0001"},{"@pid":"41/2926","text":"Tho Le-Ngoc"}]},"title":"Diversity Analysis of Smart Relaying with Equal Gain Combining.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/icc/VienNL09","url":"https://dblp.org/rec/conf/icc/VienNL09"}, "url":"URL#5147121" }, { "@score":"1", "@id":"5147122", "info":{"authors":{"author":[{"@pid":"04/737","text":"Ingo Viering"},{"@pid":"43/2730","text":"Martin Döttling"},{"@pid":"49/7882","text":"Andreas Lobinger"}]},"title":"A Mathematical Perspective of Self-Optimizing Wireless Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/VieringDL09","doi":"10.1109/ICC.2009.5198628","ee":"https://doi.org/10.1109/ICC.2009.5198628","url":"https://dblp.org/rec/conf/icc/VieringDL09"}, "url":"URL#5147122" }, { "@score":"1", "@id":"5147123", "info":{"authors":{"author":[{"@pid":"74/7726","text":"Jordi Vilà-Valls"},{"@pid":"92/3006","text":"Jean-Marc Brossier"},{"@pid":"14/6634","text":"Laurent Ros"}]},"title":"Extended Kalman Filter for Oversampled Dynamical Phase Offset Estimation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Vila-VallsBR09","doi":"10.1109/ICC.2009.5199020","ee":"https://doi.org/10.1109/ICC.2009.5199020","url":"https://dblp.org/rec/conf/icc/Vila-VallsBR09"}, "url":"URL#5147123" }, { "@score":"1", "@id":"5147124", "info":{"authors":{"author":[{"@pid":"96/6776","text":"Kyriakos Vlachos"},{"@pid":"04/7881","text":"Apostolos Siokis"}]},"title":"A Service-Transparent and Self-Organized Optical Network Architecture.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/VlachosS09","doi":"10.1109/ICC.2009.5198669","ee":"https://doi.org/10.1109/ICC.2009.5198669","url":"https://dblp.org/rec/conf/icc/VlachosS09"}, "url":"URL#5147124" }, { "@score":"1", "@id":"5147125", "info":{"authors":{"author":[{"@pid":"14/2332","text":"Lars Völker"},{"@pid":"88/2674","text":"Denis Martin"},{"@pid":"08/2599","text":"Christoph Werle"},{"@pid":"z/MZitterbart","text":"Martina Zitterbart"},{"@pid":"67/5634","text":"Ibtissam El Khayat"}]},"title":"Selecting Concurrent Network Architectures at Runtime.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/VolkerMWZK09","doi":"10.1109/ICC.2009.5199445","ee":"https://doi.org/10.1109/ICC.2009.5199445","url":"https://dblp.org/rec/conf/icc/VolkerMWZK09"}, "url":"URL#5147125" }, { "@score":"1", "@id":"5147126", "info":{"authors":{"author":[{"@pid":"43/2397","text":"Tomotaka Wada"},{"@pid":"91/4073","text":"Norie Uchitomi"},{"@pid":"62/6809","text":"Yuuki Ota"},{"@pid":"14/43","text":"Toshihiro Hori"},{"@pid":"95/589","text":"Kouichi Mutsuura"},{"@pid":"21/4867","text":"Hiromi Okada"}]},"title":"A Novel Scheme for Spatial Localization of Passive RFID Tags; Communication Range Recognition (CRR) Scheme.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WadaUOHMO09","doi":"10.1109/ICC.2009.5198654","ee":"https://doi.org/10.1109/ICC.2009.5198654","url":"https://dblp.org/rec/conf/icc/WadaUOHMO09"}, "url":"URL#5147126" }, { "@score":"1", "@id":"5147127", "info":{"authors":{"author":[{"@pid":"93/2179","text":"Sonia Waharte"},{"@pid":"b/RaoufBoutaba","text":"Raouf Boutaba"},{"@pid":"31/1770","text":"Pascal Anelli"}]},"title":"Impact of Gateways Placement on Clustering Algorithms in Wireless Mesh Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WaharteBA09","doi":"10.1109/ICC.2009.5305932","ee":"https://doi.org/10.1109/ICC.2009.5305932","url":"https://dblp.org/rec/conf/icc/WaharteBA09"}, "url":"URL#5147127" }, { "@score":"1", "@id":"5147128", "info":{"authors":{"author":[{"@pid":"22/4753","text":"Issam Wahibi"},{"@pid":"96/1488","text":"Meryem Ouzzif"},{"@pid":"32/5287","text":"Jérôme Le Masson"},{"@pid":"92/6817","text":"Samir Saoudi"}]},"title":"Crosstalk Cancellation in Upstream Coordinated DSL Using an Iterative MMSE Receiver.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WahibiOMS09","doi":"10.1109/ICC.2009.5198876","ee":"https://doi.org/10.1109/ICC.2009.5198876","url":"https://dblp.org/rec/conf/icc/WahibiOMS09"}, "url":"URL#5147128" }, { "@score":"1", "@id":"5147129", "info":{"authors":{"author":[{"@pid":"90/5470","text":"Brett T. Walkenhorst"},{"@pid":"56/5264","text":"Mary Ann Ingram"}]},"title":"Repeater-Assisted Capacity Enhancement (RACE) for MIMO Links in a Line-of-Sight Environment.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WalkenhorstI09","doi":"10.1109/ICC.2009.5199408","ee":"https://doi.org/10.1109/ICC.2009.5199408","url":"https://dblp.org/rec/conf/icc/WalkenhorstI09"}, "url":"URL#5147129" }, { "@score":"1", "@id":"5147130", "info":{"authors":{"author":{"@pid":"79/2170","text":"Jon W. Wallace"}},"title":"Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Wallace09","doi":"10.1109/ICC.2009.5199440","ee":"https://doi.org/10.1109/ICC.2009.5199440","url":"https://dblp.org/rec/conf/icc/Wallace09"}, "url":"URL#5147130" }, { "@score":"1", "@id":"5147131", "info":{"authors":{"author":[{"@pid":"07/5334","text":"Jerry Chun-Ping Wang"},{"@pid":"26/1047","text":"Mehran Abolhasan"},{"@pid":"58/7825","text":"Daniel Robert Franklin"},{"@pid":"73/836","text":"Farzad Safaei"}]},"title":"Characterising the Behaviour of IEEE 802.11 Broadcast Transmissions in Ad Hoc Wireless LANs.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangAFS09","doi":"10.1109/ICC.2009.5198823","ee":"https://doi.org/10.1109/ICC.2009.5198823","url":"https://dblp.org/rec/conf/icc/WangAFS09"}, "url":"URL#5147131" }, { "@score":"1", "@id":"5147132", "info":{"authors":{"author":[{"@pid":"03/4540-4","text":"Zijian Wang 0004"},{"@pid":"52/5520","text":"Eyuphan Bulut"},{"@pid":"s/BKSzymanski","text":"Boleslaw K. Szymanski"}]},"title":"Energy Efficient Collision Aware Multipath Routing for Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangBS09","doi":"10.1109/ICC.2009.5198989","ee":"https://doi.org/10.1109/ICC.2009.5198989","url":"https://dblp.org/rec/conf/icc/WangBS09"}, "url":"URL#5147132" }, { "@score":"1", "@id":"5147133", "info":{"authors":{"author":[{"@pid":"59/6754-1","text":"Weiwei Wang 0001"},{"@pid":"72/3887-1","text":"Jun Cai 0001"},{"@pid":"19/4871","text":"Zihua Guo"},{"@pid":"02/4501","text":"Changjia Chen"},{"@pid":"s/XueminShen","text":"Xuemin (Sherman) Shen"}]},"title":"Four-Antenna Based Structure for Cellular Networks with Frequency Reuse Factor of One.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangCGCS09","doi":"10.1109/ICC.2009.5199035","ee":"https://doi.org/10.1109/ICC.2009.5199035","url":"https://dblp.org/rec/conf/icc/WangCGCS09"}, "url":"URL#5147133" }, { "@score":"1", "@id":"5147134", "info":{"authors":{"author":[{"@pid":"98/2227","text":"Chengqun Wang"},{"@pid":"55/2484-1","text":"Jiming Chen 0001"},{"@pid":"40/4160","text":"Youxian Sun"},{"@pid":"s/XueminShen","text":"Xuemin (Sherman) Shen"}]},"title":"Wireless Sensor Networks Localization with Isomap.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangCSS09","doi":"10.1109/ICC.2009.5199576","ee":"https://doi.org/10.1109/ICC.2009.5199576","url":"https://dblp.org/rec/conf/icc/WangCSS09"}, "url":"URL#5147134" }, { "@score":"1", "@id":"5147135", "info":{"authors":{"author":[{"@pid":"67/6649-11","text":"Yi Wang 0011"},{"@pid":"79/940","text":"Qimei Cui"},{"@pid":"96/6496","text":"Xiaofeng Tao"},{"@pid":"75/2963","text":"Mingyu Zhou"}]},"title":"Robust AMC Scheme Against Feedback Delay in Vehicular Environment.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangCTZ09","doi":"10.1109/ICC.2009.5199422","ee":"https://doi.org/10.1109/ICC.2009.5199422","url":"https://dblp.org/rec/conf/icc/WangCTZ09"}, "url":"URL#5147135" }, { "@score":"1", "@id":"5147136", "info":{"authors":{"author":[{"@pid":"97/6505-4","text":"Qing Wang 0004"},{"@pid":"44/2936","text":"Pingyi Fan"},{"@pid":"95/5358","text":"Khaled Ben Letaief"}]},"title":"On the Log-Normal Fading Networks: Power Control and Spatial Reuse.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangFL09","doi":"10.1109/ICC.2009.5199256","ee":"https://doi.org/10.1109/ICC.2009.5199256","url":"https://dblp.org/rec/conf/icc/WangFL09"}, "url":"URL#5147136" }, { "@score":"1", "@id":"5147137", "info":{"authors":{"author":[{"@pid":"27/1386","text":"Qingchuan Wang"},{"@pid":"95/6808","text":"Chen He"}]},"title":"Practical Dirty Paper Coding with Nested Binary LDGM-LDPC Codes.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangH09","doi":"10.1109/ICC.2009.5199355","ee":"https://doi.org/10.1109/ICC.2009.5199355","url":"https://dblp.org/rec/conf/icc/WangH09"}, "url":"URL#5147137" }, { "@score":"1", "@id":"5147138", "info":{"authors":{"author":[{"@pid":"56/2028","text":"Shu-Hsien Wang"},{"@pid":"03/3341","text":"Yao-Win Peter Hong"}]},"title":"Transmission Control with Imperfect CSI in Channel-Aware Slotted ALOHA Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangH09a","doi":"10.1109/ICC.2009.5199542","ee":"https://doi.org/10.1109/ICC.2009.5199542","url":"https://dblp.org/rec/conf/icc/WangH09a"}, "url":"URL#5147138" }, { "@score":"1", "@id":"5147139", "info":{"authors":{"author":[{"@pid":"13/1187","text":"Chin-Liang Wang"},{"@pid":"61/7883","text":"Yan-Wun Huang"},{"@pid":"77/68","text":"Yu-Chih Huang"}]},"title":"An Energy-Efficient Cooperative SIMO Transmission Scheme for Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangHH09","doi":"10.1109/ICC.2009.5198729","ee":"https://doi.org/10.1109/ICC.2009.5198729","url":"https://dblp.org/rec/conf/icc/WangHH09"}, "url":"URL#5147139" }, { "@score":"1", "@id":"5147140", "info":{"authors":{"author":[{"@pid":"77/6747","text":"Tianqi Wang"},{"@pid":"h/WendiRabinerHeinzelman","text":"Wendi B. Heinzelman"},{"@pid":"05/2339","text":"Alireza Seyedi"}]},"title":"Minimizing Energy Consumption in IR-UWB Based Wireless Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangHS09","doi":"10.1109/ICC.2009.5199181","ee":"https://doi.org/10.1109/ICC.2009.5199181","url":"https://dblp.org/rec/conf/icc/WangHS09"}, "url":"URL#5147140" }, { "@score":"1", "@id":"5147141", "info":{"authors":{"author":[{"@pid":"81/5136","text":"Alex Wang"},{"@pid":"01/1516","text":"Vikram Krishnamurthy"}]},"title":"Target Identification and Distributed Cooperative Control of Sensor Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangK09","doi":"10.1109/ICC.2009.5199510","ee":"https://doi.org/10.1109/ICC.2009.5199510","url":"https://dblp.org/rec/conf/icc/WangK09"}, "url":"URL#5147141" }, { "@score":"1", "@id":"5147142", "info":{"authors":{"author":[{"@pid":"34/7881","text":"Dexiang Wang"},{"@pid":"73/7883","text":"Arvindhan Kumar"},{"@pid":"90/7881","text":"Madhan Sivakumar"},{"@pid":"16/2073","text":"Janise McNair"}]},"title":"A Fault-Tolerant Backbone Network Architecture Targeting Time-Critical Communication for Avionic WDM LANs.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangKSM09","doi":"10.1109/ICC.2009.5198601","ee":"https://doi.org/10.1109/ICC.2009.5198601","url":"https://dblp.org/rec/conf/icc/WangKSM09"}, "url":"URL#5147142" }, { "@score":"1", "@id":"5147143", "info":{"authors":{"author":[{"@pid":"65/5018","text":"Yuanzhuo Wang"},{"@pid":"53/2571","text":"Chuang Lin"},{"@pid":"w/YangWang18","text":"Yang Wang 0018"},{"@pid":"79/3122","text":"Kun Meng"}]},"title":"Security Analysis of Enterprise Network Based on Stochastic Game Nets Model.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangLWM09","doi":"10.1109/ICC.2009.5199442","ee":"https://doi.org/10.1109/ICC.2009.5199442","url":"https://dblp.org/rec/conf/icc/WangLWM09"}, "url":"URL#5147143" }, { "@score":"1", "@id":"5147144", "info":{"authors":{"author":[{"@pid":"w/RuiWang7","text":"Rui Wang 0007"},{"@pid":"68/4401","text":"Vincent K. N. Lau"},{"@pid":"88/714","text":"Cui Ying"},{"@pid":"21/506","text":"Kaibin Huang"},{"@pid":"22/5523","text":"Bin Chen"},{"@pid":"62/5690","text":"Xia Yang"}]},"title":"Decentralized Fair Resource Allocation for Relay-Assisted Cognitive Cellular Downlink Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangLYHCY09","doi":"10.1109/ICC.2009.5198883","ee":"https://doi.org/10.1109/ICC.2009.5198883","url":"https://dblp.org/rec/conf/icc/WangLYHCY09"}, "url":"URL#5147144" }, { "@score":"1", "@id":"5147145", "info":{"authors":{"author":[{"@pid":"37/1304-1","text":"Ping Wang 0001"},{"@pid":"76/440","text":"Dusit Niyato"},{"@pid":"15/5983-1","text":"Hai Jiang 0001"}]},"title":"Voice Service Support over Cognitive Radio Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangNJ09","doi":"10.1109/ICC.2009.5199569","ee":"https://doi.org/10.1109/ICC.2009.5199569","url":"https://dblp.org/rec/conf/icc/WangNJ09"}, "url":"URL#5147145" }, { "@score":"1", "@id":"5147146", "info":{"authors":{"author":[{"@pid":"93/3724","text":"Tsang-Yi Wang"},{"@pid":"57/7883","text":"Jyun-Wei Pu"},{"@pid":"71/2819","text":"Chih-Peng Li"}]},"title":"Joint Detection and Estimation for Cooperative Communications in Cluster-Based Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangPL09","doi":"10.1109/ICC.2009.5199111","ee":"https://doi.org/10.1109/ICC.2009.5199111","url":"https://dblp.org/rec/conf/icc/WangPL09"}, "url":"URL#5147146" }, { "@score":"1", "@id":"5147147", "info":{"authors":{"author":[{"@pid":"75/2596","text":"Cheng-Xiang Wang 0001"},{"@pid":"60/3451","text":"Heung-Gyoon Ryu"},{"@pid":"41/2526","text":"Hsiao-Hwa Chen"},{"@pid":"06/868","text":"Yejun He"}]},"title":"Hybrid ARQ with Rate Adaptation in Multiband OFDM UWB Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangRCH09","doi":"10.1109/ICC.2009.5199058","ee":"https://doi.org/10.1109/ICC.2009.5199058","url":"https://dblp.org/rec/conf/icc/WangRCH09"}, "url":"URL#5147147" }, { "@score":"1", "@id":"5147148", "info":{"authors":{"author":[{"@pid":"49/7881","text":"Chung-Wang Wang"},{"@pid":"w/LiChunWang","text":"Li-Chun Wang 0001"}]},"title":"Modeling and Analysis for Proactive-Decision Spectrum Handoff in Cognitive Radio Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangW09","doi":"10.1109/ICC.2009.5199189","ee":"https://doi.org/10.1109/ICC.2009.5199189","url":"https://dblp.org/rec/conf/icc/WangW09"}, "url":"URL#5147148" }, { "@score":"1", "@id":"5147149", "info":{"authors":{"author":[{"@pid":"29/5259-67","text":"Jie Wang 0067"},{"@pid":"75/2669-1","text":"Jianxin Wang 0001"},{"@pid":"c/JianerChen","text":"Jianer Chen"},{"@pid":"87/1222-5","text":"Xi Zhang 0005"}]},"title":"An Automated Signature Generation Approach for Polymorphic Worm Based on Color Coding.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangWCZ09","doi":"10.1109/ICC.2009.5198721","ee":"https://doi.org/10.1109/ICC.2009.5198721","url":"https://dblp.org/rec/conf/icc/WangWCZ09"}, "url":"URL#5147149" }, { "@score":"1", "@id":"5147150", "info":{"authors":{"author":[{"@pid":"71/3182","text":"Yiming Wang"},{"@pid":"w/LingyuWang","text":"Lingyu Wang 0001"},{"@pid":"f/BCMFung","text":"Benjamin C. M. Fung"}]},"title":"Preserving Privacy for Location-Based Services with Continuous Queries.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangWF09","doi":"10.1109/ICC.2009.5199361","ee":"https://doi.org/10.1109/ICC.2009.5199361","url":"https://dblp.org/rec/conf/icc/WangWF09"}, "url":"URL#5147150" }, { "@score":"1", "@id":"5147151", "info":{"authors":{"author":[{"@pid":"87/7881","text":"Chaojiong Wang"},{"@pid":"46/2005-1","text":"Ning Wang 0001"},{"@pid":"86/2404","text":"Michael P. Howarth"},{"@pid":"p/GeorgePavlou","text":"George Pavlou"}]},"title":"An Adaptive Peer Selection Scheme with Dynamic Network Condition Awareness.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangWHP09","doi":"10.1109/ICC.2009.5198715","ee":"https://doi.org/10.1109/ICC.2009.5198715","url":"https://dblp.org/rec/conf/icc/WangWHP09"}, "url":"URL#5147151" }, { "@score":"1", "@id":"5147152", "info":{"authors":{"author":[{"@pid":"33/3535","text":"Hua Wang"},{"@pid":"86/5273","text":"Chun-lin Xiong"},{"@pid":"86/692","text":"Villy Bæk Iversen"}]},"title":"Uplink Capacity of Multi-Class IEEE 802.16j Relay Networks with Adaptive Modulation and Coding.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangXI09","doi":"10.1109/ICC.2009.5199552","ee":"https://doi.org/10.1109/ICC.2009.5199552","url":"https://dblp.org/rec/conf/icc/WangXI09"}, "url":"URL#5147152" }, { "@score":"1", "@id":"5147153", "info":{"authors":{"author":[{"@pid":"37/2062-1","text":"Huiming Wang 0001"},{"@pid":"83/4637-1","text":"Xiang-Gen Xia 0001"},{"@pid":"02/1271-1","text":"Qinye Yin 0001"},{"@pid":"71/1535-6","text":"Lin Bai 0006"}]},"title":"A Distributed Linear Convolutive Space-Frequency Coding for Cooperative Communication Systems with Multiple Frequency Offsets.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangXYB09","doi":"10.1109/ICC.2009.5198597","ee":"https://doi.org/10.1109/ICC.2009.5198597","url":"https://dblp.org/rec/conf/icc/WangXYB09"}, "url":"URL#5147153" }, { "@score":"1", "@id":"5147154", "info":{"authors":{"author":[{"@pid":"13/1898","text":"Bin Wang"},{"@pid":"04/4784","text":"Dongmei Zhao"}]},"title":"Downlink Power Distribution in a Wireless CDMA Network with Cooperative Relaying.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangZ09","doi":"10.1109/ICC.2009.5198946","ee":"https://doi.org/10.1109/ICC.2009.5198946","url":"https://dblp.org/rec/conf/icc/WangZ09"}, "url":"URL#5147154" }, { "@score":"1", "@id":"5147155", "info":{"authors":{"author":[{"@pid":"w/LeiWang34","text":"Lei Wang 0034"},{"@pid":"84/6889-6","text":"Jie Zhang 0006"},{"@pid":"47/543","text":"Guanjun Gao"},{"@pid":"53/3720","text":"Xiuzhong Chen"},{"@pid":"48/761","text":"Xue Chen"},{"@pid":"07/2178","text":"Wanyi Gu"}]},"title":"Noise-Aware Wavelength Assignment for Wavelength Switched Optical Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangZGCCG09","doi":"10.1109/ICC.2009.5199222","ee":"https://doi.org/10.1109/ICC.2009.5199222","url":"https://dblp.org/rec/conf/icc/WangZGCCG09"}, "url":"URL#5147155" }, { "@score":"1", "@id":"5147156", "info":{"authors":{"author":[{"@pid":"60/4823-1","text":"Xinguo Wang 0001"},{"@pid":"06/449-1","text":"Xinming Zhang 0001"},{"@pid":"04/2024-1","text":"Qian Zhang 0001"},{"@pid":"14/2048-1","text":"Guoliang Chen 0001"}]},"title":"An Energy-Efficient Integrated MAC and Routing Protocol for Wireless Sensor Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WangZZC09","doi":"10.1109/ICC.2009.5198730","ee":"https://doi.org/10.1109/ICC.2009.5198730","url":"https://dblp.org/rec/conf/icc/WangZZC09"}, "url":"URL#5147156" }, { "@score":"1", "@id":"5147157", "info":{"authors":{"author":[{"@pid":"08/985","text":"Andreas Wapf"},{"@pid":"44/3577","text":"Michael R. Souryal"}]},"title":"Measuring Indoor Mobile Wireless Link Quality.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WapfS09","doi":"10.1109/ICC.2009.5199176","ee":"https://doi.org/10.1109/ICC.2009.5199176","url":"https://dblp.org/rec/conf/icc/WapfS09"}, "url":"URL#5147157" }, { "@score":"1", "@id":"5147158", "info":{"authors":{"author":[{"@pid":"29/511","text":"Xinning Wei"},{"@pid":"24/3256","text":"Tobias Weber"},{"@pid":"61/3829","text":"Andreas Wolfgang"},{"@pid":"52/7701","text":"Nima Seifi"}]},"title":"Joint Transmission with Significant CSI in the Downlink of Distributed Antenna Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WeiWWS09","doi":"10.1109/ICC.2009.5199124","ee":"https://doi.org/10.1109/ICC.2009.5199124","url":"https://dblp.org/rec/conf/icc/WeiWWS09"}, "url":"URL#5147158" }, { "@score":"1", "@id":"5147159", "info":{"authors":{"author":[{"@pid":"11/420","text":"Guy E. Weichenberg"},{"@pid":"84/510","text":"Vincent W. S. Chan"},{"@pid":"m/MurielMedard","text":"Muriel Médard"}]},"title":"Performance Analysis of Optical Flow Switching.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WeichenbergCM09","doi":"10.1109/ICC.2009.5199312","ee":"https://doi.org/10.1109/ICC.2009.5199312","url":"https://dblp.org/rec/conf/icc/WeichenbergCM09"}, "url":"URL#5147159" }, { "@score":"1", "@id":"5147160", "info":{"authors":{"author":[{"@pid":"73/7447","text":"Elias Weingärtner"},{"@pid":"09/7882","text":"Hendrik vom Lehn"},{"@pid":"w/KlausWehrle","text":"Klaus Wehrle"}]},"title":"A Performance Comparison of Recent Network Simulators.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WeingartnerLW09","doi":"10.1109/ICC.2009.5198657","ee":"https://doi.org/10.1109/ICC.2009.5198657","url":"https://dblp.org/rec/conf/icc/WeingartnerLW09"}, "url":"URL#5147160" }, { "@score":"1", "@id":"5147161", "info":{"authors":{"author":[{"@pid":"05/1264","text":"Matthias Wellens"},{"@pid":"97/1612","text":"Janne Riihijärvi"},{"@pid":"40/5133","text":"Martin Gordziel"},{"@pid":"m/PetriMahonen","text":"Petri Mähönen"}]},"title":"Spatial Statistics of Spectrum Usage: From Measurements to Spectrum Models.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WellensRGM09","doi":"10.1109/ICC.2009.5199473","ee":"https://doi.org/10.1109/ICC.2009.5199473","url":"https://dblp.org/rec/conf/icc/WellensRGM09"}, "url":"URL#5147161" }, { "@score":"1", "@id":"5147162", "info":{"authors":{"author":{"@pid":"37/800","text":"Cédric Westphal"}},"title":"A Study of the Percolation Threshold for k-Collaborative Wireless Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Westphal09","doi":"10.1109/ICC.2009.5198677","ee":"https://doi.org/10.1109/ICC.2009.5198677","url":"https://dblp.org/rec/conf/icc/Westphal09"}, "url":"URL#5147162" }, { "@score":"1", "@id":"5147163", "info":{"authors":{"author":[{"@pid":"84/5395","text":"Jack H. Winters"},{"@pid":"34/7883","text":"Andrey Kobyakov"},{"@pid":"49/6130","text":"Michael Sauer"}]},"title":"Picocells with MIMO and Cell Bonding for WLAN Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WintersKS09","doi":"10.1109/ICC.2009.5199338","ee":"https://doi.org/10.1109/ICC.2009.5199338","url":"https://dblp.org/rec/conf/icc/WintersKS09"}, "url":"URL#5147163" }, { "@score":"1", "@id":"5147164", "info":{"authors":{"author":[{"@pid":"79/4033","text":"Yongdong Wu"},{"@pid":"46/1953-1","text":"Feng Bao 0001"},{"@pid":"12/1707","text":"Ying Qiu"}]},"title":"Tracing Stateful Pirate Decoders.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WuBQ09","doi":"10.1109/ICC.2009.5199537","ee":"https://doi.org/10.1109/ICC.2009.5199537","url":"https://dblp.org/rec/conf/icc/WuBQ09"}, "url":"URL#5147164" }, { "@score":"1", "@id":"5147165", "info":{"authors":{"author":[{"@pid":"37/6865","text":"Yiyue Wu"},{"@pid":"c/ARobertCalderbank","text":"A. Robert Calderbank"}]},"title":"Construction of High Rate Super-Orthogonal Space-Time Block Codes.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WuC09","doi":"10.1109/ICC.2009.5198848","ee":"https://doi.org/10.1109/ICC.2009.5198848","url":"https://dblp.org/rec/conf/icc/WuC09"}, "url":"URL#5147165" }, { "@score":"1", "@id":"5147166", "info":{"authors":{"author":[{"@pid":"50/4130","text":"Chen-Chi Wu"},{"@pid":"02/1783","text":"Kuan-Ta Chen"},{"@pid":"79/10285","text":"Yu-Chun Chang"},{"@pid":"31/3229","text":"Chin-Laung Lei"}]},"title":"Peer-to-Peer Application Recognition Based on Signaling Activity.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WuCCL09","doi":"10.1109/ICC.2009.5199305","ee":"https://doi.org/10.1109/ICC.2009.5199305","url":"https://dblp.org/rec/conf/icc/WuCCL09"}, "url":"URL#5147166" }, { "@score":"1", "@id":"5147167", "info":{"authors":{"author":[{"@pid":"27/4601","text":"Hung-Shen Wu"},{"@pid":"31/7003","text":"Nen-Fu Huang"},{"@pid":"66/6959","text":"Guan-Hao Lin"}]},"title":"Identifying the Use of Data/Voice/Video-Based P2P Traffic by DNS-Query Behavior.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WuHL09","doi":"10.1109/ICC.2009.5199062","ee":"https://doi.org/10.1109/ICC.2009.5199062","url":"https://dblp.org/rec/conf/icc/WuHL09"}, "url":"URL#5147167" }, { "@score":"1", "@id":"5147168", "info":{"authors":{"author":[{"@pid":"71/7883","text":"Lianhai Wu"},{"@pid":"32/2368","text":"Jiaru Lin"},{"@pid":"67/229","text":"Kai Niu 0001"},{"@pid":"99/5332-1","text":"Zhiqiang He 0001"}]},"title":"Performance of Dual-Hop Transmissions with Fixed Gain Relays over Generalized-K Fading Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WuLNH09","doi":"10.1109/ICC.2009.5199331","ee":"https://doi.org/10.1109/ICC.2009.5199331","url":"https://dblp.org/rec/conf/icc/WuLNH09"}, "url":"URL#5147168" }, { "@score":"1", "@id":"5147169", "info":{"authors":{"author":[{"@pid":"44/3684-4","text":"Yi Wu 0004"},{"@pid":"24/201","text":"Yanqun Le"},{"@pid":"87/461-10","text":"Dongmei Zhang 0010"}]},"title":"Cycle Synchronizing Approach for Sleep Mode Operation in WiMAX System.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WuLZ09","doi":"10.1109/ICC.2009.5305935","ee":"https://doi.org/10.1109/ICC.2009.5305935","url":"https://dblp.org/rec/conf/icc/WuLZ09"}, "url":"URL#5147169" }, { "@score":"1", "@id":"5147170", "info":{"authors":{"author":[{"@pid":"10/6382","text":"Yiqun Wu"},{"@pid":"51/2196","text":"Zhisheng Niu"}]},"title":"Exploiting Cooperative Diversity and Spatial Reuse in Multihop Cellular Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WuN09","doi":"10.1109/ICC.2009.5199017","ee":"https://doi.org/10.1109/ICC.2009.5199017","url":"https://dblp.org/rec/conf/icc/WuN09"}, "url":"URL#5147170" }, { "@score":"1", "@id":"5147171", "info":{"authors":{"author":[{"@pid":"44/3684-6","text":"Yi Wu 0006"},{"@pid":"38/3161","text":"Matthias Pätzold 0001"}]},"title":"Performance Analysis of Cooperative Communication Systems with Imperfect Channel Estimation.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WuP09","doi":"10.1109/ICC.2009.5199307","ee":"https://doi.org/10.1109/ICC.2009.5199307","url":"https://dblp.org/rec/conf/icc/WuP09"}, "url":"URL#5147171" }, { "@score":"1", "@id":"5147172", "info":{"authors":{"author":[{"@pid":"87/2533-8","text":"Qiang Wu 0008"},{"@pid":"10/5241","text":"Tilman Wolf"}]},"title":"Support for Dynamic Adaptation in Next Generation Packet Processing Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WuW09","doi":"10.1109/ICC.2009.5199500","ee":"https://doi.org/10.1109/ICC.2009.5199500","url":"https://dblp.org/rec/conf/icc/WuW09"}, "url":"URL#5147172" }, { "@score":"1", "@id":"5147173", "info":{"authors":{"author":[{"@pid":"28/1726","text":"Zhuo Wu"},{"@pid":"10/5630","text":"Xin Wang"},{"@pid":"81/4761","text":"Liang Zhou"}]},"title":"Signal Detection in Distributed Cooperative Cellular Systems without Perfect Synchronisation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WuWZ09","doi":"10.1109/ICC.2009.5199459","ee":"https://doi.org/10.1109/ICC.2009.5199459","url":"https://dblp.org/rec/conf/icc/WuWZ09"}, "url":"URL#5147173" }, { "@score":"1", "@id":"5147174", "info":{"authors":{"author":[{"@pid":"90/5247","text":"Rafael F. Wyrembelski"},{"@pid":"01/534","text":"Igor Bjelakovic"},{"@pid":"80/3329","text":"Tobias J. Oechtering"},{"@pid":"39/3615","text":"Holger Boche"}]},"title":"On the Capacity of Bidirectional Broadcast Channels under Channel Uncertainty.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/WyrembelskiBOB09","doi":"10.1109/ICC.2009.5199250","ee":"https://doi.org/10.1109/ICC.2009.5199250","url":"https://dblp.org/rec/conf/icc/WyrembelskiBOB09"}, "url":"URL#5147174" }, { "@score":"1", "@id":"5147175", "info":{"authors":{"author":[{"@pid":"49/7884","text":"Kai Xi"},{"@pid":"99/5144","text":"Jiankun Hu"}]},"title":"Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XiH09","doi":"10.1109/ICC.2009.5198785","ee":"https://doi.org/10.1109/ICC.2009.5198785","url":"https://dblp.org/rec/conf/icc/XiH09"}, "url":"URL#5147175" }, { "@score":"1", "@id":"5147176", "info":{"authors":{"author":[{"@pid":"54/344","text":"Ming Xia"},{"@pid":"77/5716","text":"Charles U. Martel"},{"@pid":"11/6844","text":"Massimo Tornatore"},{"@pid":"86/3964","text":"Biswanath Mukherjee"}]},"title":"Service Cluster: A New Framework for SLA-Oriented Provisioning in WDM Mesh Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XiaMTM09","doi":"10.1109/ICC.2009.5199453","ee":"https://doi.org/10.1109/ICC.2009.5199453","url":"https://dblp.org/rec/conf/icc/XiaMTM09"}, "url":"URL#5147176" }, { "@score":"1", "@id":"5147177", "info":{"authors":{"author":[{"@pid":"10/1374","text":"Qiuyan Xia"},{"@pid":"43/6295","text":"Jian Pu"},{"@pid":"38/6823","text":"Mounir Hamdi"}]},"title":"Model-Tree-Based Rate Adaptation Scheme for Vehicular Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XiaPH09","doi":"10.1109/ICC.2009.5199195","ee":"https://doi.org/10.1109/ICC.2009.5199195","url":"https://dblp.org/rec/conf/icc/XiaPH09"}, "url":"URL#5147177" }, { "@score":"1", "@id":"5147178", "info":{"authors":{"author":[{"@pid":"96/2276-6","text":"Peng Xiao 0006"},{"@pid":"11/6486","text":"Zhigang Hu"}]},"title":"Deadline-Guarantee-Enhanced Co-Allocation for Parameter Sweep Application in Grid.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XiaoH09","doi":"10.1109/ICC.2009.5198881","ee":"https://doi.org/10.1109/ICC.2009.5198881","url":"https://dblp.org/rec/conf/icc/XiaoH09"}, "url":"URL#5147178" }, { "@score":"1", "@id":"5147179", "info":{"authors":{"author":[{"@pid":"53/6129","text":"Yufeng Xiao"},{"@pid":"09/1365-63","text":"Xin Li 0063"},{"@pid":"82/6387","text":"Yuhong Li"},{"@pid":"35/1712","text":"Shanzhi Chen"}]},"title":"Evaluate Reliability of Wireless Sensor Networks with OBDD.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XiaoLLC09","doi":"10.1109/ICC.2009.5199006","ee":"https://doi.org/10.1109/ICC.2009.5199006","url":"https://dblp.org/rec/conf/icc/XiaoLLC09"}, "url":"URL#5147179" }, { "@score":"1", "@id":"5147180", "info":{"authors":{"author":[{"@pid":"92/55","text":"Yuanzhang Xiao"},{"@pid":"10/413","text":"Wei Miao"},{"@pid":"z/MingZhao1","text":"Ming Zhao 0001"},{"@pid":"76/5271","text":"Shidong Zhou"},{"@pid":"02/736-1","text":"Jing Wang 0001"}]},"title":"Limited-Feedback Modified Block Diagonalization for Multiuser MIMO Downlink with Time-Varying Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XiaoMZZW09","doi":"10.1109/ICC.2009.5199135","ee":"https://doi.org/10.1109/ICC.2009.5199135","url":"https://dblp.org/rec/conf/icc/XiaoMZZW09"}, "url":"URL#5147180" }, { "@score":"1", "@id":"5147181", "info":{"authors":{"author":[{"@pid":"83/3968","text":"Pei Xiao"},{"@pid":"17/1153","text":"Mathini Sellathurai"}]},"title":"Iterative Receiver Design for MIMO Systems with Improper Signal Constellations.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XiaoS09","doi":"10.1109/ICC.2009.5199106","ee":"https://doi.org/10.1109/ICC.2009.5199106","url":"https://dblp.org/rec/conf/icc/XiaoS09"}, "url":"URL#5147181" }, { "@score":"1", "@id":"5147182", "info":{"authors":{"author":[{"@pid":"13/3965","text":"Chengshan Xiao"},{"@pid":"90/6246","text":"Yahong Rosa Zheng"}]},"title":"Transmit Precoding for MIMO Systems with Partial CSI and Discrete-Constellation Inputs.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XiaoZ09","doi":"10.1109/ICC.2009.5199543","ee":"https://doi.org/10.1109/ICC.2009.5199543","url":"https://dblp.org/rec/conf/icc/XiaoZ09"}, "url":"URL#5147182" }, { "@score":"1", "@id":"5147183", "info":{"authors":{"author":[{"@pid":"72/4903","text":"Junfeng Xie"},{"@pid":"85/5250","text":"Edward Chan"},{"@pid":"51/1742","text":"Guihai Chen"},{"@pid":"73/1810","text":"Yang Guo"}]},"title":"Push Popular Segments in P2P VoD System: Possibility and Design.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XieCCG09","doi":"10.1109/ICC.2009.5199376","ee":"https://doi.org/10.1109/ICC.2009.5199376","url":"https://dblp.org/rec/conf/icc/XieCCG09"}, "url":"URL#5147183" }, { "@score":"1", "@id":"5147184", "info":{"authors":{"author":[{"@pid":"61/7401","text":"Chongyang Xie"},{"@pid":"11/6297","text":"Nasir Ghani"},{"@pid":"53/4481-2","text":"Qing Liu 0002"},{"@pid":"71/7881","text":"Wei Wennie Shu"},{"@pid":"92/4079","text":"Ashwin Gumaste"},{"@pid":"65/7820","text":"Yan Qiao"},{"@pid":"63/1722","text":"Min-You Wu"}]},"title":"Multi-Point Ethernet over Next-Generation SONET/SDH.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XieGLSGQW09","doi":"10.1109/ICC.2009.5199207","ee":"https://doi.org/10.1109/ICC.2009.5199207","url":"https://dblp.org/rec/conf/icc/XieGLSGQW09"}, "url":"URL#5147184" }, { "@score":"1", "@id":"5147185", "info":{"authors":{"author":[{"@pid":"56/2373","text":"Jing Xie"},{"@pid":"81/5546","text":"King-Shan Lui"}]},"title":"Modeling Random Walk Search Algorithms in Unstructured P2P Networks with Social Information.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XieL09","doi":"10.1109/ICC.2009.5199194","ee":"https://doi.org/10.1109/ICC.2009.5199194","url":"https://dblp.org/rec/conf/icc/XieL09"}, "url":"URL#5147185" }, { "@score":"1", "@id":"5147186", "info":{"authors":{"author":[{"@pid":"23/7882","text":"Lang Xie"},{"@pid":"94/4726-1","text":"Jie Xiang 0001"},{"@pid":"04/3348-2","text":"Yan Zhang 0002"},{"@pid":"43/6657","text":"Jin Zhang"}]},"title":"Joint Bandwidth Reservation and Admission Control in IEEE 802.16e Based Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XieXZZ09","doi":"10.1109/ICC.2009.5199109","ee":"https://doi.org/10.1109/ICC.2009.5199109","url":"https://dblp.org/rec/conf/icc/XieXZZ09"}, "url":"URL#5147186" }, { "@score":"1", "@id":"5147187", "info":{"authors":{"author":[{"@pid":"99/6285-1","text":"Qin Xin 0001"},{"@pid":"04/3348-2","text":"Yan Zhang 0002"},{"@pid":"94/4726-1","text":"Jie Xiang 0001"}]},"title":"Minimum-Latency Gossiping in Multi-Hop Wireless Mesh Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XinZX09","doi":"10.1109/ICC.2009.5199185","ee":"https://doi.org/10.1109/ICC.2009.5199185","url":"https://dblp.org/rec/conf/icc/XinZX09"}, "url":"URL#5147187" }, { "@score":"1", "@id":"5147188", "info":{"authors":{"author":[{"@pid":"86/5273","text":"Chun-lin Xiong"},{"@pid":"33/3535","text":"Hua Wang"},{"@pid":"46/7725","text":"Xiaoying Zhang"},{"@pid":"48/2647","text":"Ji-Bo Wei"},{"@pid":"57/1674","text":"Chaojing Tang"}]},"title":"Low Complexity Variational Bayes Iterative Receiver for MIMO-OFDM Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XiongWZWT09","doi":"10.1109/ICC.2009.5199155","ee":"https://doi.org/10.1109/ICC.2009.5199155","url":"https://dblp.org/rec/conf/icc/XiongWZWT09"}, "url":"URL#5147188" }, { "@score":"1", "@id":"5147189", "info":{"authors":{"author":[{"@pid":"20/7883","text":"Cong Xiong"},{"@pid":"76/1584-1","text":"Xin Zhang 0001"}]},"title":"Parallel Detection Algorithm with Selective Interference Cancellation for V-BLAST Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XiongZ09","doi":"10.1109/ICC.2009.5199300","ee":"https://doi.org/10.1109/ICC.2009.5199300","url":"https://dblp.org/rec/conf/icc/XiongZ09"}, "url":"URL#5147189" }, { "@score":"1", "@id":"5147190", "info":{"authors":{"author":[{"@pid":"90/7566","text":"Tianyin Xu"},{"@pid":"38/4520","text":"Jianzhong Chen"},{"@pid":"98/3150","text":"Wenzhong Li"},{"@pid":"24/3318","text":"Sanglu Lu"},{"@pid":"73/1810","text":"Yang Guo"},{"@pid":"38/6823","text":"Mounir Hamdi"}]},"title":"Supporting VCR-Like Operations in Derivative Tree-Based P2P Streaming Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XuCLLGH09","doi":"10.1109/ICC.2009.5199502","ee":"https://doi.org/10.1109/ICC.2009.5199502","url":"https://dblp.org/rec/conf/icc/XuCLLGH09"}, "url":"URL#5147190" }, { "@score":"1", "@id":"5147191", "info":{"authors":{"author":[{"@pid":"54/3420","text":"Liang Xu"},{"@pid":"75/2652","text":"Changcheng Huang"},{"@pid":"30/2484","text":"James Yan"},{"@pid":"98/5321","text":"Tadeusz Drwiega"}]},"title":"De-Registration Based S-CSCF Load Balancing in IMS Core Network.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XuHYD09","doi":"10.1109/ICC.2009.5198895","ee":"https://doi.org/10.1109/ICC.2009.5198895","url":"https://dblp.org/rec/conf/icc/XuHYD09"}, "url":"URL#5147191" }, { "@score":"1", "@id":"5147192", "info":{"authors":{"author":[{"@pid":"56/7883-1","text":"Kevin S. Xu 0001"},{"@pid":"20/2373","text":"Mark Kliger"},{"@pid":"86/2531","text":"Yilun Chen"},{"@pid":"46/560","text":"Peter J. Woolf"},{"@pid":"h/AlfredOHeroIII","text":"Alfred O. Hero III"}]},"title":"Revealing Social Networks of Spammers Through Spectral Clustering.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XuKCWH09","doi":"10.1109/ICC.2009.5199418","ee":"https://doi.org/10.1109/ICC.2009.5199418","url":"https://dblp.org/rec/conf/icc/XuKCWH09"}, "url":"URL#5147192" }, { "@score":"1", "@id":"5147193", "info":{"authors":{"author":[{"@pid":"19/360-7","text":"Lei Xu 0007"},{"@pid":"52/5208","text":"Qilian Liang"}]},"title":"Radar Sensor Network Using a New Triphase Coded Waveform: Theory and Application.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XuL09","doi":"10.1109/ICC.2009.5199384","ee":"https://doi.org/10.1109/ICC.2009.5199384","url":"https://dblp.org/rec/conf/icc/XuL09"}, "url":"URL#5147193" }, { "@score":"1", "@id":"5147194", "info":{"authors":{"author":[{"@pid":"34/7882","text":"Aolin Xu"},{"@pid":"30/3337","text":"Kewu Peng"},{"@pid":"79/1231","text":"Zhixing Yang"}]},"title":"Joint Synchronization Using Cyclic Property.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XuPY09","doi":"10.1109/ICC.2009.5199123","ee":"https://doi.org/10.1109/ICC.2009.5199123","url":"https://dblp.org/rec/conf/icc/XuPY09"}, "url":"URL#5147194" }, { "@score":"1", "@id":"5147195", "info":{"authors":{"author":[{"@pid":"42/1870-1","text":"Wen Xu 0001"},{"@pid":"77/7881","text":"Christian Schroeder"},{"@pid":"h/PeterAdamHoeher","text":"Peter Adam Hoeher"}]},"title":"A Stochastic MIMO Model for Far-End Crosstalk in VDSL Cable Binders.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XuSH09","doi":"10.1109/ICC.2009.5198675","ee":"https://doi.org/10.1109/ICC.2009.5198675","url":"https://dblp.org/rec/conf/icc/XuSH09"}, "url":"URL#5147195" }, { "@score":"1", "@id":"5147196", "info":{"authors":{"author":[{"@pid":"40/3410","text":"Daojun Xue"},{"@pid":"181/2860","text":"Yang Qin"},{"@pid":"49/1752","text":"Chee Kheong Siew"}]},"title":"Deterministic QoS Provisioning with Network Calculus Based Admission Control in WDM EPON Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XueQS09","doi":"10.1109/ICC.2009.5198914","ee":"https://doi.org/10.1109/ICC.2009.5198914","url":"https://dblp.org/rec/conf/icc/XueQS09"}, "url":"URL#5147196" }, { "@score":"1", "@id":"5147197", "info":{"authors":{"author":[{"@pid":"08/7884","text":"Dongyue Xue"},{"@pid":"26/6190-2","text":"Hui Yu 0002"},{"@pid":"96/1149","text":"Xinbing Wang"},{"@pid":"41/2526","text":"Hsiao-Hwa Chen"}]},"title":"Adoption of Cognitive Radio Scheme to Class-Based Call Admission Control.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XueYWC09","doi":"10.1109/ICC.2009.5198711","ee":"https://doi.org/10.1109/ICC.2009.5198711","url":"https://dblp.org/rec/conf/icc/XueYWC09"}, "url":"URL#5147197" }, { "@score":"1", "@id":"5147198", "info":{"authors":{"author":[{"@pid":"11/1586","text":"Zhaoyong Xun"},{"@pid":"60/4951","text":"Jianxin Liao"},{"@pid":"09/4144-2","text":"Xiaomin Zhu 0002"},{"@pid":"42/675","text":"Chun Wang"},{"@pid":"92/2499","text":"Yufei Cao"}]},"title":"A Group Based Service Triggering Algorithm for IMS Network.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/XunLZWC09","doi":"10.1109/ICC.2009.5198614","ee":"https://doi.org/10.1109/ICC.2009.5198614","url":"https://dblp.org/rec/conf/icc/XunLZWC09"}, "url":"URL#5147198" }, { "@score":"1", "@id":"5147199", "info":{"authors":{"author":[{"@pid":"13/3953-9","text":"Yan Yan 0009"},{"@pid":"01/986","text":"Baoxian Zhang"},{"@pid":"88/1293","text":"Zhuang Zhao"},{"@pid":"58/2732","text":"Xiaojun Shen"},{"@pid":"26/4870-1","text":"Jian Ma 0001"}]},"title":"Mechanism for Maximizing Area-Centric Coding Gains in Wireless Multihop Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YanZZSM09","doi":"10.1109/ICC.2009.5199177","ee":"https://doi.org/10.1109/ICC.2009.5199177","url":"https://dblp.org/rec/conf/icc/YanZZSM09"}, "url":"URL#5147199" }, { "@score":"1", "@id":"5147200", "info":{"authors":{"author":[{"@pid":"95/7880","text":"Jianxiao Yang"},{"@pid":"14/3834","text":"Benoit Geller"},{"@pid":"99/5469","text":"Cédric Herzet"},{"@pid":"92/3006","text":"Jean-Marc Brossier"}]},"title":"Smoothing PLLs for QAM Dynamical Phase Estimation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YangGHB09","doi":"10.1109/ICC.2009.5199465","ee":"https://doi.org/10.1109/ICC.2009.5199465","url":"https://dblp.org/rec/conf/icc/YangGHB09"}, "url":"URL#5147200" }, { "@score":"1", "@id":"5147201", "info":{"authors":{"author":[{"@pid":"95/7880","text":"Jianxiao Yang"},{"@pid":"14/3834","text":"Benoit Geller"},{"@pid":"98/2404","text":"Anne Wei"}]},"title":"Approximate Expressions for Cramer-Rao Bounds of Code Aided QAM Dynamical Phase Estimation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YangGW09","doi":"10.1109/ICC.2009.5198756","ee":"https://doi.org/10.1109/ICC.2009.5198756","url":"https://dblp.org/rec/conf/icc/YangGW09"}, "url":"URL#5147201" }, { "@score":"1", "@id":"5147202", "info":{"authors":{"author":[{"@pid":"56/2998","text":"Yin Yang"},{"@pid":"46/7881","text":"Lilian Luo"},{"@pid":"42/2131","text":"Roger S. Cheng"}]},"title":"Dynamic Decode-And-Forward and Amplify-And-Forward Cooperative Strategy Using Distributed Space-Time Code in Uplink MIMO Systems with Multiple Relays.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YangLC09","doi":"10.1109/ICC.2009.5198955","ee":"https://doi.org/10.1109/ICC.2009.5198955","url":"https://dblp.org/rec/conf/icc/YangLC09"}, "url":"URL#5147202" }, { "@score":"1", "@id":"5147203", "info":{"authors":{"author":[{"@pid":"13/1520-1","text":"Xi Yang 0001"},{"@pid":"93/6611","text":"Tom Lehman"},{"@pid":"32/1792","text":"Kenichi Ogaki"},{"@pid":"37/5596","text":"Tomohiro Otani"}]},"title":"A Study on Cross-Layer Multi-Constraint Path Computation for IP-Over-Optical Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YangLOO09","doi":"10.1109/ICC.2009.5198679","ee":"https://doi.org/10.1109/ICC.2009.5198679","url":"https://dblp.org/rec/conf/icc/YangLOO09"}, "url":"URL#5147203" }, { "@score":"1", "@id":"5147204", "info":{"authors":{"author":[{"@pid":"04/2","text":"Yu-Han Yang"},{"@pid":"31/1246","text":"Shih-Chun Lin"},{"@pid":"79/5109","text":"Hsuan-Jung Su"}]},"title":"Multiuser MIMO Downlink Beamforming Based on Group Maximum SINR Filtering with Per Stream Power Allocation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YangLS09","doi":"10.1109/ICC.2009.5199212","ee":"https://doi.org/10.1109/ICC.2009.5199212","url":"https://dblp.org/rec/conf/icc/YangLS09"}, "url":"URL#5147204" }, { "@score":"1", "@id":"5147205", "info":{"authors":{"author":[{"@pid":"61/4296","text":"Xiaolong Yang"},{"@pid":"67/3463","text":"Yunfeng Peng"},{"@pid":"53/6133","text":"Keping Long"},{"@pid":"02/7884","text":"Fenfen Dong"},{"@pid":"56/6585-1","text":"Sheng Huang 0001"},{"@pid":"76/7882","text":"Xiaolin Duan"}]},"title":"VB-Rescheduling: An Efficient Data Channel Rescheduling Algorithm Based on Virtual Burst for OBS Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YangPLDHD09","doi":"10.1109/ICC.2009.5305945","ee":"https://doi.org/10.1109/ICC.2009.5305945","url":"https://dblp.org/rec/conf/icc/YangPLDHD09"}, "url":"URL#5147205" }, { "@score":"1", "@id":"5147206", "info":{"authors":{"author":[{"@pid":"42/7882","text":"Wen-Hsin Yang"},{"@pid":"73/6852","text":"You-Chiun Wang"},{"@pid":"25/5808","text":"Yu-Chee Tseng"},{"@pid":"15/4486","text":"Bao-Shuh Paul Lin"}]},"title":"Spatial and Temporal Packet Recovery Schemes for DVB-H Systems through IP-Relay Wireless Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YangWTL09","doi":"10.1109/ICC.2009.5199470","ee":"https://doi.org/10.1109/ICC.2009.5199470","url":"https://dblp.org/rec/conf/icc/YangWTL09"}, "url":"URL#5147206" }, { "@score":"1", "@id":"5147207", "info":{"authors":{"author":[{"@pid":"13/5969-7","text":"Zhenyu Yang 0007"},{"@pid":"80/1651-1","text":"Kai Zeng 0001"},{"@pid":"73/3673","text":"Wenjing Lou"}]},"title":"FSA: A Fast Coordination Scheme for Opportunistic Routing.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YangZL09","doi":"10.1109/ICC.2009.5199042","ee":"https://doi.org/10.1109/ICC.2009.5199042","url":"https://dblp.org/rec/conf/icc/YangZL09"}, "url":"URL#5147207" }, { "@score":"1", "@id":"5147208", "info":{"authors":{"author":[{"@pid":"56/32","text":"Wang Yao"},{"@pid":"34/1910","text":"Sheng Chen 0001"},{"@pid":"08/3221","text":"Shuang Tan"},{"@pid":"92/5955","text":"Lajos Hanzo"}]},"title":"Particle Swarm Optimisation Aided Minimum Bit Error Rate Multiuser Transmission.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YaoCTH09","doi":"10.1109/ICC.2009.5199303","ee":"https://doi.org/10.1109/ICC.2009.5199303","url":"https://dblp.org/rec/conf/icc/YaoCTH09"}, "url":"URL#5147208" }, { "@score":"1", "@id":"5147209", "info":{"authors":{"author":[{"@pid":"78/7881","text":"Yuzhe Yao"},{"@pid":"12/6140","text":"Xiaodai Dong"},{"@pid":"52/2629","text":"Noel Tin"}]},"title":"A New Joint Timing and Channel Estimation Method for Block Transmission UWB Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YaoDT09","doi":"10.1109/ICC.2009.5198641","ee":"https://doi.org/10.1109/ICC.2009.5198641","url":"https://dblp.org/rec/conf/icc/YaoDT09"}, "url":"URL#5147209" }, { "@score":"1", "@id":"5147210", "info":{"authors":{"author":[{"@pid":"99/5627","text":"Kenta Yasukawa"},{"@pid":"98/6848","text":"Andrea G. Forte"},{"@pid":"s/HenningSchulzrinne","text":"Henning Schulzrinne"}]},"title":"Distributed Delay Estimation and Call Admission Control in IEEE 802.11 Wireless LANs.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YasukawaFS09","doi":"10.1109/ICC.2009.5198924","ee":"https://doi.org/10.1109/ICC.2009.5198924","url":"https://dblp.org/rec/conf/icc/YasukawaFS09"}, "url":"URL#5147210" }, { "@score":"1", "@id":"5147211", "info":{"authors":{"author":[{"@pid":"48/302","text":"Amin Alamdar Yazdi"},{"@pid":"98/1677","text":"Sameh Sorour"},{"@pid":"82/3084","text":"Shahrokh Valaee"},{"@pid":"11/6712","text":"Ronny Yongho Kim"}]},"title":"Joint Reduction of Peak to Average Power Ratio and Symbol Loss Rate in Multicarrier Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YazdiSVK09","doi":"10.1109/ICC.2009.5199120","ee":"https://doi.org/10.1109/ICC.2009.5199120","url":"https://dblp.org/rec/conf/icc/YazdiSVK09"}, "url":"URL#5147211" }, { "@score":"1", "@id":"5147212", "info":{"authors":{"author":[{"@pid":"11/1687","text":"Wai-Leong Yeow"},{"@pid":"33/1519","text":"Anh Tuan Hoang"},{"@pid":"08/45","text":"Chen-Khong Tham"}]},"title":"On Average Packet Delay Bounds and Loss Rates of Network-Coded Multicasts over Wireless Downlinks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YeowHT09","doi":"10.1109/ICC.2009.5199234","ee":"https://doi.org/10.1109/ICC.2009.5199234","url":"https://dblp.org/rec/conf/icc/YeowHT09"}, "url":"URL#5147212" }, { "@score":"1", "@id":"5147213", "info":{"authors":{"author":[{"@pid":"42/2346","text":"Huiyue Yi"},{"@pid":"96/5737","text":"Honglin Hu"},{"@pid":"55/3387","text":"Yun Rui"},{"@pid":"71/369","text":"Kunqi Guo"},{"@pid":"07/314","text":"Jian Zhang"}]},"title":"Null Space-Based Precoding Scheme for Secondary Transmission in a Cognitive Radio MIMO System Using Second-Order Statistics.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YiHRGZ09","doi":"10.1109/ICC.2009.5199229","ee":"https://doi.org/10.1109/ICC.2009.5199229","url":"https://dblp.org/rec/conf/icc/YiHRGZ09"}, "url":"URL#5147213" }, { "@score":"1", "@id":"5147214", "info":{"authors":{"author":[{"@pid":"12/4809","text":"Mete Yilmaz"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"},{"@pid":"92/2234","text":"Jung-Hong Kao"},{"@pid":"22/7884","text":"Pinar Yilmaz"}]},"title":"Active Queue Management for MAC Client Implementation of Resilient Packet Rings.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YilmazAKY09","doi":"10.1109/ICC.2009.5198693","ee":"https://doi.org/10.1109/ICC.2009.5198693","url":"https://dblp.org/rec/conf/icc/YilmazAKY09"}, "url":"URL#5147214" }, { "@score":"1", "@id":"5147215", "info":{"authors":{"author":[{"@pid":"63/3806","text":"Raymond Yim"},{"@pid":"54/2683","text":"Andreas F. Molisch"},{"@pid":"60/3446","text":"Jinyun Zhang"}]},"title":"Optimization of Split-And-Combine Relaying.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YimMZ09","doi":"10.1109/ICC.2009.5199294","ee":"https://doi.org/10.1109/ICC.2009.5199294","url":"https://dblp.org/rec/conf/icc/YimMZ09"}, "url":"URL#5147215" }, { "@score":"1", "@id":"5147216", "info":{"authors":{"author":[{"@pid":"94/2655","text":"Changchuan Yin"},{"@pid":"99/4474-1","text":"Long Gao 0001"},{"@pid":"84/2345-2","text":"Tie Liu 0002"},{"@pid":"48/4914","text":"Shuguang Cui"}]},"title":"Transmission Capacities for Overlaid Wireless Ad Hoc Networks with Outage Constraints.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YinGLC09","doi":"10.1109/ICC.2009.5199539","ee":"https://doi.org/10.1109/ICC.2009.5199539","url":"https://dblp.org/rec/conf/icc/YinGLC09"}, "url":"URL#5147216" }, { "@score":"1", "@id":"5147217", "info":{"authors":{"author":[{"@pid":"21/682","text":"Candy Yiu"},{"@pid":"21/3471","text":"Suresh Singh"}]},"title":"SDMA for 60GHz Gigabit Wireless Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YiuS09","doi":"10.1109/ICC.2009.5199436","ee":"https://doi.org/10.1109/ICC.2009.5199436","url":"https://dblp.org/rec/conf/icc/YiuS09"}, "url":"URL#5147217" }, { "@score":"1", "@id":"5147218", "info":{"authors":{"author":[{"@pid":"30/720","text":"Benjamin Yolken"},{"@pid":"69/6610","text":"Dimitrios Tsamis"},{"@pid":"b/NicholasBambos","text":"Nicholas Bambos"}]},"title":"Cost and Target-Based Scheduling for Switch Power Control.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YolkenTB09","doi":"10.1109/ICC.2009.5198867","ee":"https://doi.org/10.1109/ICC.2009.5198867","url":"https://dblp.org/rec/conf/icc/YolkenTB09"}, "url":"URL#5147218" }, { "@score":"1", "@id":"5147219", "info":{"authors":{"author":{"@pid":"55/5283","text":"Takuya Yoshihiro"}},"title":"Loop-Free Link Stability Metrics for Proactive Routing in Wireless Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Yoshihiro09","doi":"10.1109/ICC.2009.5199147","ee":"https://doi.org/10.1109/ICC.2009.5199147","url":"https://dblp.org/rec/conf/icc/Yoshihiro09"}, "url":"URL#5147219" }, { "@score":"1", "@id":"5147220", "info":{"authors":{"author":[{"@pid":"74/7882","text":"Allen Y. C. Yu"},{"@pid":"43/6602","text":"Ka Lun Eddie Law"}]},"title":"Atomic Distributed Semaphores for Accessing Networked Data.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YuL09","doi":"10.1109/ICC.2009.5198768","ee":"https://doi.org/10.1109/ICC.2009.5198768","url":"https://dblp.org/rec/conf/icc/YuL09"}, "url":"URL#5147220" }, { "@score":"1", "@id":"5147221", "info":{"authors":{"author":[{"@pid":"52/6311","text":"Chia-Hao Yu"},{"@pid":"54/306","text":"Olav Tirkkonen"},{"@pid":"23/2076","text":"Klaus Doppler"},{"@pid":"07/4043","text":"Cássio B. Ribeiro"}]},"title":"Power Optimization of Device-to-Device Communication Underlaying Cellular Communication.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YuTDR09","doi":"10.1109/ICC.2009.5199353","ee":"https://doi.org/10.1109/ICC.2009.5199353","url":"https://dblp.org/rec/conf/icc/YuTDR09"}, "url":"URL#5147221" }, { "@score":"1", "@id":"5147222", "info":{"authors":{"author":[{"@pid":"67/2268","text":"Wei Yuan"},{"@pid":"49/3283-4","text":"Wei Liu 0004"},{"@pid":"31/1966","text":"Wenqing Cheng"},{"@pid":"32/5536","text":"Shu Wang"}]},"title":"Variable-Width Channel Allocation in Wireless LAN: A Game-Theoretic Perspective.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YuanLCW09","doi":"10.1109/ICC.2009.5199563","ee":"https://doi.org/10.1109/ICC.2009.5199563","url":"https://dblp.org/rec/conf/icc/YuanLCW09"}, "url":"URL#5147222" }, { "@score":"1", "@id":"5147223", "info":{"authors":{"author":[{"@pid":"86/2025-2","text":"Li Yue 0002"},{"@pid":"82/1569","text":"Nalin S. Weerasinghe"},{"@pid":"70/1648","text":"Chenggao Han"},{"@pid":"70/3441","text":"Takeshi Hashimoto"}]},"title":"Partial Multiuser Detection for CS-CDMA/CP over Multipath Channels and Its Comparison with DS-CDMA.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YueWHH09","doi":"10.1109/ICC.2009.5199302","ee":"https://doi.org/10.1109/ICC.2009.5199302","url":"https://dblp.org/rec/conf/icc/YueWHH09"}, "url":"URL#5147223" }, { "@score":"1", "@id":"5147224", "info":{"authors":{"author":[{"@pid":"38/5353","text":"Mira Yun"},{"@pid":"36/2728","text":"Yu Zhou"},{"@pid":"92/924","text":"Amrinder Arora"},{"@pid":"06/1713","text":"Hyeong-Ah Choi"}]},"title":"Channel-Assignment and Scheduling in Wireless Mesh Networks Considering Switching Overhead.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/YunZAC09","doi":"10.1109/ICC.2009.5198822","ee":"https://doi.org/10.1109/ICC.2009.5198822","url":"https://dblp.org/rec/conf/icc/YunZAC09"}, "url":"URL#5147224" }, { "@score":"1", "@id":"5147225", "info":{"authors":{"author":[{"@pid":"65/3033","text":"Said Zaghloul"},{"@pid":"70/7704","text":"José I. Aznar"},{"@pid":"30/1610","text":"Admela Jukan"}]},"title":"Application Layer Signaling for Proactive Handoff Management in All-IP Wireless Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZaghloulAJ09","doi":"10.1109/ICC.2009.5198753","ee":"https://doi.org/10.1109/ICC.2009.5198753","url":"https://dblp.org/rec/conf/icc/ZaghloulAJ09"}, "url":"URL#5147225" }, { "@score":"1", "@id":"5147226", "info":{"authors":{"author":[{"@pid":"07/3113","text":"Abdellatif Zaidi"},{"@pid":"v/LucVandendorpe","text":"Luc Vandendorpe"}]},"title":"Achievable Rates for the Gaussian Relay Interferer Channel with a Cognitive Source.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZaidiV09","doi":"10.1109/ICC.2009.5198689","ee":"https://doi.org/10.1109/ICC.2009.5198689","url":"https://dblp.org/rec/conf/icc/ZaidiV09"}, "url":"URL#5147226" }, { "@score":"1", "@id":"5147227", "info":{"authors":{"author":[{"@pid":"57/4738","text":"Ahmed Zaki"},{"@pid":"06/1529","text":"Saif K. Mohammed"},{"@pid":"65/6366","text":"Ananthanarayanan Chockalingam"},{"@pid":"r/BSundarRajan","text":"B. Sundar Rajan"}]},"title":"A Training-Based Iterative Detection/Channel Estimation Scheme for Large Non-Orthogonal STBC MIMO Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZakiMCR09","doi":"10.1109/ICC.2009.5198683","ee":"https://doi.org/10.1109/ICC.2009.5198683","url":"https://dblp.org/rec/conf/icc/ZakiMCR09"}, "url":"URL#5147227" }, { "@score":"1", "@id":"5147228", "info":{"authors":{"author":[{"@pid":"33/2708","text":"Hossein Zamiri-Jafarian"},{"@pid":"57/7882","text":"Mohammad Moghaddari"}]},"title":"Polynomial Eigen-Beamformer in Time Domain for MIMO-OFDM Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Zamiri-JafarianM09","doi":"10.1109/ICC.2009.5199343","ee":"https://doi.org/10.1109/ICC.2009.5199343","url":"https://dblp.org/rec/conf/icc/Zamiri-JafarianM09"}, "url":"URL#5147228" }, { "@score":"1", "@id":"5147229", "info":{"authors":{"author":[{"@pid":"33/2708","text":"Hossein Zamiri-Jafarian"},{"@pid":"92/609","text":"Morteza Rajabzadeh"}]},"title":"SVD-Based Receiver for Downlink MIMO MC-CDMA Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Zamiri-JafarianR09","doi":"10.1109/ICC.2009.5199503","ee":"https://doi.org/10.1109/ICC.2009.5199503","url":"https://dblp.org/rec/conf/icc/Zamiri-JafarianR09"}, "url":"URL#5147229" }, { "@score":"1", "@id":"5147230", "info":{"authors":{"author":{"@pid":"40/5059","text":"Andrea Zanella"}},"title":"Carrier-Sense ARQ: Squeezing Out Bluetooth Performance While Preserving Standard Compliancy.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Zanella09","doi":"10.1109/ICC.2009.5198812","ee":"https://doi.org/10.1109/ICC.2009.5198812","url":"https://dblp.org/rec/conf/icc/Zanella09"}, "url":"URL#5147230" }, { "@score":"1", "@id":"5147231", "info":{"authors":{"author":[{"@pid":"69/2296","text":"Keyvan Zarifi"},{"@pid":"85/3663","text":"Sofiène Affes"},{"@pid":"37/2687","text":"Ali Ghrayeb"}]},"title":"Asymptotic Analysis and Design of Multiuser Cooperative DS-CDMA Systems.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZarifiAG09","doi":"10.1109/ICC.2009.5198765","ee":"https://doi.org/10.1109/ICC.2009.5198765","url":"https://dblp.org/rec/conf/icc/ZarifiAG09"}, "url":"URL#5147231" }, { "@score":"1", "@id":"5147232", "info":{"authors":{"author":[{"@pid":"32/7882","text":"Sepideh Zarrin"},{"@pid":"83/5663","text":"Teng Joon Lim"}]},"title":"Composite Hypothesis Testing for Cooperative Spectrum Sensing in Cognitive Radio.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZarrinL09","doi":"10.1109/ICC.2009.5198841","ee":"https://doi.org/10.1109/ICC.2009.5198841","url":"https://dblp.org/rec/conf/icc/ZarrinL09"}, "url":"URL#5147232" }, { "@score":"1", "@id":"5147233", "info":{"authors":{"author":[{"@pid":"39/7881","text":"Bassem Zayen"},{"@pid":"07/5360","text":"Aawatif Hayar"},{"@pid":"79/852","text":"Kimmo Kansanen"}]},"title":"Blind Spectrum Sensing for Cognitive Radio Based on Signal Space Dimension Estimation.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZayenHK09","doi":"10.1109/ICC.2009.5198794","ee":"https://doi.org/10.1109/ICC.2009.5198794","url":"https://dblp.org/rec/conf/icc/ZayenHK09"}, "url":"URL#5147233" }, { "@score":"1", "@id":"5147234", "info":{"authors":{"author":[{"@pid":"30/4146","text":"Hassan Zeineddine"},{"@pid":"b/GvBochmann","text":"Gregor von Bochmann"}]},"title":"A Distributed Algorithm for Least Constraining Slot Allocation in MPLS Optical TDM Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZeineddineB09","doi":"10.1109/ICC.2009.5198595","ee":"https://doi.org/10.1109/ICC.2009.5198595","url":"https://dblp.org/rec/conf/icc/ZeineddineB09"}, "url":"URL#5147234" }, { "@score":"1", "@id":"5147235", "info":{"authors":{"author":[{"@pid":"99/7881","text":"Georg Zeitler"},{"@pid":"k/RalfKoetter","text":"Ralf Koetter"},{"@pid":"19/2794","text":"Gerhard Bauch 0001"},{"@pid":"07/3803","text":"Jörg Widmer"}]},"title":"On Quantizer Design for Soft Values in the Multiple-Access Relay Channel.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZeitlerKBW09","doi":"10.1109/ICC.2009.5199246","ee":"https://doi.org/10.1109/ICC.2009.5199246","url":"https://dblp.org/rec/conf/icc/ZeitlerKBW09"}, "url":"URL#5147235" }, { "@score":"1", "@id":"5147236", "info":{"authors":{"author":[{"@pid":"12/2695","text":"Xiang Nian Zeng"},{"@pid":"37/2687","text":"Ali Ghrayeb"}]},"title":"CFO Estimation Schemes for Differential OFDM Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZengG09","doi":"10.1109/ICC.2009.5198814","ee":"https://doi.org/10.1109/ICC.2009.5198814","url":"https://dblp.org/rec/conf/icc/ZengG09"}, "url":"URL#5147236" }, { "@score":"1", "@id":"5147237", "info":{"authors":{"author":[{"@pid":"65/4787","text":"Yonghong Zeng"},{"@pid":"80/7880","text":"Ser Wah Oh"},{"@pid":"64/2352","text":"Ronghong Mo"}]},"title":"Subcarrier Sensing for Distributed OFDMA in Powerline Communication.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZengOM09","doi":"10.1109/ICC.2009.5305940","ee":"https://doi.org/10.1109/ICC.2009.5305940","url":"https://dblp.org/rec/conf/icc/ZengOM09"}, "url":"URL#5147237" }, { "@score":"1", "@id":"5147238", "info":{"authors":{"author":[{"@pid":"32/5332","text":"Hui Zeng"},{"@pid":"88/490","text":"Chenxi Zhu"}]},"title":"System Design and Resource Allocation in 802.16j Multi-Hop Relay Systems Under the User Rate Fairness Constraint.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZengZ09","doi":"10.1109/ICC.2009.5199506","ee":"https://doi.org/10.1109/ICC.2009.5199506","url":"https://dblp.org/rec/conf/icc/ZengZ09"}, "url":"URL#5147238" }, { "@score":"1", "@id":"5147239", "info":{"authors":{"author":[{"@pid":"53/5323","text":"Meng Zeng"},{"@pid":"60/2536-6","text":"Rui Zhang 0006"},{"@pid":"48/4914","text":"Shuguang Cui"}]},"title":"Optimal Transmission for Dying Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZengZC09","doi":"10.1109/ICC.2009.5199287","ee":"https://doi.org/10.1109/ICC.2009.5199287","url":"https://dblp.org/rec/conf/icc/ZengZC09"}, "url":"URL#5147239" }, { "@score":"1", "@id":"5147240", "info":{"authors":{"author":{"@pid":"07/884","text":"Keith Q. T. Zhang"}},"title":"Advanced Detection Techniques for Cognitive Radio.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Zhang09","doi":"10.1109/ICC.2009.5198712","ee":"https://doi.org/10.1109/ICC.2009.5198712","url":"https://dblp.org/rec/conf/icc/Zhang09"}, "url":"URL#5147240" }, { "@score":"1", "@id":"5147241", "info":{"authors":{"author":{"@pid":"04/3348-2","text":"Yan Zhang 0002"}},"title":"Spectrum Handoff in Cognitive Radio Networks: Opportunistic and Negotiated Situations.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/Zhang09a","doi":"10.1109/ICC.2009.5199479","ee":"https://doi.org/10.1109/ICC.2009.5199479","url":"https://dblp.org/rec/conf/icc/Zhang09a"}, "url":"URL#5147241" }, { "@score":"1", "@id":"5147242", "info":{"authors":{"author":[{"@pid":"83/5342-4","text":"Min Zhang 0004"},{"@pid":"59/3573","text":"Thushara D. Abhayapala"},{"@pid":"38/7883","text":"Dhammika Jayalath"},{"@pid":"47/3219","text":"David B. Smith 0001"},{"@pid":"72/4313","text":"Chandranath R. N. Athaudage"}]},"title":"Matched Rotation Precoding: A New Paradigm in Space-Frequency Coding.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangAJSA09","doi":"10.1109/ICC.2009.5199168","ee":"https://doi.org/10.1109/ICC.2009.5199168","url":"https://dblp.org/rec/conf/icc/ZhangAJSA09"}, "url":"URL#5147242" }, { "@score":"1", "@id":"5147243", "info":{"authors":{"author":[{"@pid":"16/2294","text":"Jianwen Zhang"},{"@pid":"22/878","text":"Marc André Armand"},{"@pid":"12/512","text":"Pooi Yuen Kam"}]},"title":"A Mutual Information Approach for Comparing LLR Metrics for Iterative Decoders.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangAK09","doi":"10.1109/ICC.2009.5198635","ee":"https://doi.org/10.1109/ICC.2009.5198635","url":"https://dblp.org/rec/conf/icc/ZhangAK09"}, "url":"URL#5147243" }, { "@score":"1", "@id":"5147244", "info":{"authors":{"author":[{"@pid":"29/6172","text":"Zhenxia Zhang"},{"@pid":"b/AzzedineBoukerche","text":"Azzedine Boukerche"}]},"title":"An Efficient MAC Layer Handoff Scheme for WiFi-Based Multichannel Wireless Mesh Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangB09","doi":"10.1109/ICC.2009.5198726","ee":"https://doi.org/10.1109/ICC.2009.5198726","url":"https://dblp.org/rec/conf/icc/ZhangB09"}, "url":"URL#5147244" }, { "@score":"1", "@id":"5147245", "info":{"authors":{"author":[{"@pid":"55/725","text":"Ruonan Zhang"},{"@pid":"20/8688-1","text":"Lin Cai 0001"}]},"title":"Markov Modeling for Data Block Transmission of OFDM Systems over Fading Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangC09","doi":"10.1109/ICC.2009.5199167","ee":"https://doi.org/10.1109/ICC.2009.5199167","url":"https://dblp.org/rec/conf/icc/ZhangC09"}, "url":"URL#5147245" }, { "@score":"1", "@id":"5147246", "info":{"authors":{"author":[{"@pid":"60/2536-6","text":"Rui Zhang 0006"},{"@pid":"76/1815","text":"Chin Choy Chai"},{"@pid":"98/153","text":"Ying-Chang Liang"},{"@pid":"48/4914","text":"Shuguang Cui"}]},"title":"On Capacity Region of Two-Way Multi-Antenna Relay Channel with Analogue Network Coding.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangCLC09","doi":"10.1109/ICC.2009.5199235","ee":"https://doi.org/10.1109/ICC.2009.5199235","url":"https://dblp.org/rec/conf/icc/ZhangCLC09"}, "url":"URL#5147246" }, { "@score":"1", "@id":"5147247", "info":{"authors":{"author":[{"@pid":"63/590","text":"Jiucai Zhang"},{"@pid":"61/108","text":"Song Ci"},{"@pid":"12/854","text":"Hamid Sharif"},{"@pid":"129/0346","text":"Mahmoud A. Alahmad"}]},"title":"Lifetime Optimization for Wireless Sensor Networks Using the Nonlinear Battery Current Effect.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangCSA09","doi":"10.1109/ICC.2009.5199132","ee":"https://doi.org/10.1109/ICC.2009.5199132","url":"https://dblp.org/rec/conf/icc/ZhangCSA09"}, "url":"URL#5147247" }, { "@score":"1", "@id":"5147248", "info":{"authors":{"author":[{"@pid":"59/803","text":"Weiyi Zhang"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"20/47","text":"Kendall E. Nygard"},{"@pid":"80/3726","text":"Tie Wang"}]},"title":"Self-Protecting Networking Using Dynamic p-Cycle Construction Within Link Capacity Constraint.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangDNW09","doi":"10.1109/ICC.2009.5199449","ee":"https://doi.org/10.1109/ICC.2009.5199449","url":"https://dblp.org/rec/conf/icc/ZhangDNW09"}, "url":"URL#5147248" }, { "@score":"1", "@id":"5147249", "info":{"authors":{"author":[{"@pid":"36/3422","text":"Xiao Juan Zhang"},{"@pid":"22/231-1","text":"Yi Gong 0001"}]},"title":"Adaptive Power Allocation in Two-Way Amplify-and-Forward Relay Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangG09","doi":"10.1109/ICC.2009.5198705","ee":"https://doi.org/10.1109/ICC.2009.5198705","url":"https://dblp.org/rec/conf/icc/ZhangG09"}, "url":"URL#5147249" }, { "@score":"1", "@id":"5147250", "info":{"authors":{"author":[{"@pid":"07/2301-1","text":"Ruifeng Zhang 0001"},{"@pid":"69/1193","text":"Jean-Marie Gorce"},{"@pid":"89/5838","text":"Katia Jaffrès-Runser"}]},"title":"Low Bound of Energy-Latency Trade-Off of Opportunistic Routing in Multi-Hop Networks.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangGJ09","doi":"10.1109/ICC.2009.5199148","ee":"https://doi.org/10.1109/ICC.2009.5199148","url":"https://dblp.org/rec/conf/icc/ZhangGJ09"}, "url":"URL#5147250" }, { "@score":"1", "@id":"5147251", "info":{"authors":{"author":[{"@pid":"02/101","text":"Wenzhe Zhang"},{"@pid":"17/1351","text":"Steve Hranilovic"}]},"title":"Short-Length Raptor Codes for Mobile Free-Space Optical Channels.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangH09","doi":"10.1109/ICC.2009.5199457","ee":"https://doi.org/10.1109/ICC.2009.5199457","url":"https://dblp.org/rec/conf/icc/ZhangH09"}, "url":"URL#5147251" }, { "@score":"1", "@id":"5147252", "info":{"authors":{"author":[{"@pid":"07/314-a","text":"Jian (Andrew) Zhang"},{"@pid":"23/404","text":"Leif Hanlen"}]},"title":"Non-Coherent Receiver with Fractional Sampling for Impulsive UWB Systems.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangH09a","doi":"10.1109/ICC.2009.5199224","ee":"https://doi.org/10.1109/ICC.2009.5199224","url":"https://dblp.org/rec/conf/icc/ZhangH09a"}, "url":"URL#5147252" }, { "@score":"1", "@id":"5147253", "info":{"authors":{"author":[{"@pid":"42/3079","text":"Zonghua Zhang"},{"@pid":"53/4284","text":"Pin-Han Ho"},{"@pid":"05/720","text":"Farid Naït-Abdesselam"}]},"title":"On Achieving Cost-Sensitive Anomaly Detection and Response in Mobile Ad Hoc Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangHN09","doi":"10.1109/ICC.2009.5199233","ee":"https://doi.org/10.1109/ICC.2009.5199233","url":"https://dblp.org/rec/conf/icc/ZhangHN09"}, "url":"URL#5147253" }, { "@score":"1", "@id":"5147254", "info":{"authors":{"author":[{"@pid":"21/1048-19","text":"Peng Zhang 0019"},{"@pid":"15/3342","text":"Zhen Hu"},{"@pid":"68/5807","text":"Robert C. Qiu"},{"@pid":"26/3347","text":"Brian M. Sadler"}]},"title":"A Compressed Sensing Based Ultra-Wideband Communication System.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangHQS09","doi":"10.1109/ICC.2009.5198584","ee":"https://doi.org/10.1109/ICC.2009.5198584","url":"https://dblp.org/rec/conf/icc/ZhangHQS09"}, "url":"URL#5147254" }, { "@score":"1", "@id":"5147255", "info":{"authors":{"author":[{"@pid":"60/2536-6","text":"Rui Zhang 0006"},{"@pid":"20/1696-1","text":"Xin Kang 0001"},{"@pid":"98/153","text":"Ying-Chang Liang"}]},"title":"Protecting Primary Users in Cognitive Radio Networks: Peak or Average Interference Power Constraint?","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangKL09","doi":"10.1109/ICC.2009.5199373","ee":"https://doi.org/10.1109/ICC.2009.5199373","url":"https://dblp.org/rec/conf/icc/ZhangKL09"}, "url":"URL#5147255" }, { "@score":"1", "@id":"5147256", "info":{"authors":{"author":[{"@pid":"04/2024-1","text":"Qian Zhang 0001"},{"@pid":"44/6714","text":"Christopher Lim"}]},"title":"Optimizing Access Radio in Multi-Radio Mesh Network.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangL09","doi":"10.1109/ICC.2009.5199295","ee":"https://doi.org/10.1109/ICC.2009.5199295","url":"https://dblp.org/rec/conf/icc/ZhangL09"}, "url":"URL#5147256" }, { "@score":"1", "@id":"5147257", "info":{"authors":{"author":[{"@pid":"69/2745-2","text":"Hua Zhang 0002"},{"@pid":"89/5914","text":"Geoffrey Ye Li"},{"@pid":"26/1422","text":"Yi Yuan-Wu"}]},"title":"Adaptive Spreading Code Assignment for Up-Link MC-CDMA.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangLY09","doi":"10.1109/ICC.2009.5198709","ee":"https://doi.org/10.1109/ICC.2009.5198709","url":"https://dblp.org/rec/conf/icc/ZhangLY09"}, "url":"URL#5147257" }, { "@score":"1", "@id":"5147258", "info":{"authors":{"author":[{"@pid":"50/6759","text":"Liang Zhang"},{"@pid":"53/4471","text":"Haruya Miyajima"},{"@pid":"34/1493","text":"Hideki Hayashi"}]},"title":"An Effective SIP Security Solution for Heterogeneous Mobile Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangMH09","doi":"10.1109/ICC.2009.5198725","ee":"https://doi.org/10.1109/ICC.2009.5198725","url":"https://dblp.org/rec/conf/icc/ZhangMH09"}, "url":"URL#5147258" }, { "@score":"1", "@id":"5147259", "info":{"authors":{"author":[{"@pid":"64/5666-25","text":"Lei Zhang 0025"},{"@pid":"59/2180-1","text":"Jian Ren 0001"},{"@pid":"32/4638","text":"Tongtong Li"}]},"title":"Spectrally Efficient Anti-Jamming System Design Using Message-Driven Frequency Hopping.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangRL09","doi":"10.1109/ICC.2009.5199476","ee":"https://doi.org/10.1109/ICC.2009.5199476","url":"https://dblp.org/rec/conf/icc/ZhangRL09"}, "url":"URL#5147259" }, { "@score":"1", "@id":"5147260", "info":{"authors":{"author":[{"@pid":"34/6106","text":"Aixin Zhang"},{"@pid":"25/2316","text":"Junhua Tang"},{"@pid":"95/4442","text":"Peng Wang"}]},"title":"Authentication Tests Based on Test Type Matrix.","venue":"ICC","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangTW09","doi":"10.1109/ICC.2009.5198770","ee":"https://doi.org/10.1109/ICC.2009.5198770","url":"https://dblp.org/rec/conf/icc/ZhangTW09"}, "url":"URL#5147260" }, { "@score":"1", "@id":"5147261", "info":{"authors":{"author":[{"@pid":"71/6306","text":"James Yiming Zhang"},{"@pid":"88/3604-1","text":"Jing Wu 0001"},{"@pid":"b/GvBochmann","text":"Gregor von Bochmann"},{"@pid":"08/1170","text":"Michel Savoie"}]},"title":"Differentiated Static Resource Allocation in WDM Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangWBS09","doi":"10.1109/ICC.2009.5198917","ee":"https://doi.org/10.1109/ICC.2009.5198917","url":"https://dblp.org/rec/conf/icc/ZhangWBS09"}, "url":"URL#5147261" }, { "@score":"1", "@id":"5147262", "info":{"authors":{"author":[{"@pid":"71/6306","text":"James Yiming Zhang"},{"@pid":"88/3604-1","text":"Jing Wu 0001"},{"@pid":"b/GvBochmann","text":"Gregor von Bochmann"},{"@pid":"08/1170","text":"Michel Savoie"}]},"title":"Resource Criticality Analysis of Static Resource Allocations in WDM Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangWBS09a","doi":"10.1109/ICC.2009.5199413","ee":"https://doi.org/10.1109/ICC.2009.5199413","url":"https://dblp.org/rec/conf/icc/ZhangWBS09a"}, "url":"URL#5147262" }, { "@score":"1", "@id":"5147263", "info":{"authors":{"author":[{"@pid":"66/2444","text":"Yanfeng Zhang"},{"@pid":"99/5059","text":"Cuirong Wang"},{"@pid":"76/2452","text":"Yuan Gao"}]},"title":"Weighted Size-Aware Packet Distribution for Multipath Live Streaming.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangWG09","doi":"10.1109/ICC.2009.5199572","ee":"https://doi.org/10.1109/ICC.2009.5199572","url":"https://dblp.org/rec/conf/icc/ZhangWG09"}, "url":"URL#5147263" }, { "@score":"1", "@id":"5147264", "info":{"authors":{"author":[{"@pid":"83/7883","text":"Caoxie Zhang"},{"@pid":"96/1149","text":"Xinbing Wang"},{"@pid":"l/JunLi4","text":"Jun Li 0004"}]},"title":"Cooperative Cognitive Radio with Priority Queueing Analysis.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangWL09","doi":"10.1109/ICC.2009.5198858","ee":"https://doi.org/10.1109/ICC.2009.5198858","url":"https://dblp.org/rec/conf/icc/ZhangWL09"}, "url":"URL#5147264" }, { "@score":"1", "@id":"5147265", "info":{"authors":{"author":[{"@pid":"43/6657-1","text":"Jin Zhang 0001"},{"@pid":"04/2024-1","text":"Qian Zhang 0001"}]},"title":"Contention-Aware Cooperative Routing in Wireless Mesh Networks.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangZ09","doi":"10.1109/ICC.2009.5198851","ee":"https://doi.org/10.1109/ICC.2009.5198851","url":"https://dblp.org/rec/conf/icc/ZhangZ09"}, "url":"URL#5147265" }, { "@score":"1", "@id":"5147266", "info":{"authors":{"author":[{"@pid":"29/4190-19","text":"Jun Zhang 0019"},{"@pid":"30/5821","text":"Zhongming Zheng"},{"@pid":"j/XiaohuaJia","text":"Xiaohua Jia"}]},"title":"Improved Topology Control Method for Maximizing Traffic Delivery Ratio in Wireless Mesh Networks with Directional Antennas.","venue":"ICC","pages":"1-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/icc/ZhangZJ09","doi":"10.1109/ICC.2009.5199074","ee":"https://doi.org/10.1109/ICC.2009.5199074","url":"https://dblp.org/rec/conf/icc/ZhangZJ09"}, "url":"URL#5147266" } ] } } } )