Channel Codes -- Direct-Sequence Systems -- Frequency-Hopping Systems -- Code Synchronization -- Fading of Wireless Communications -- Code-Division Multiple Access -- Detection of Spread-Spectrum Signals.Originally adopted in military networks as a means of ensuring secure communication when confronted with the threats of jamming and interception, spread-spectrum systems are now the core of com…
Modern Antennas, 2nd edition provides a complete and rigorous treatment of the theory and practice of modern antenna design and use. Written by a team of experienced engineers, the text is presented in a simple and understandable manner which guides the reader progressively through the stages of the design process. The book is aimed at practising engineers and graduate-level students, and inclu…
A Framework for Building Customized Adaptation Proxies -- Adaptable Services and Applications for Networks -- Improvement of MPLS Performance by Implementation of a Multi-Agent System -- Enabling Mobile Commerce Through Location Based Services -- Inter-Domain Traffic Engineering Using Mpls -- Autonomic Service Configuration by a Combined State Machine and Reasoning Engine Based Actor -- Self-Ma…
The Age of IPv6 -- Protocol Architecture -- Address Architecture -- Internet Control Message Protocol for IPv6 (ICMPv6) -- Neighbor Discovery -- Address Autoconfiguration -- Dynamic Host Configuration Protocol (DHCPv6) -- Interconnection between IPv4 and IPv6 -- Domain Name System (DNS) -- Mobility Support for IPv6 -- Enhanced Handover Schemes for Mobile IPv6 -- Security in Mobile IP.IPv6, Inte…
Assertion Based Verification -- to SVA -- SVA Simulation Methodology -- SVA for Finite State Machines -- SVA for Data Intensive Designs -- SVA for Memories -- SVA for Protocol Interface -- Checking the Checker.SystemVerilog language consists of three very specific areas of constructs -- design, assertions and testbench. Assertions add a whole new dimension to the ASIC verification process. Asse…
Invited Papers -- Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems -- Building Tailored Wireless Sensor Networks -- Users and Services in Intelligent Networks -- Wireless, Mobility and Emergency Network -- MAC Protocol for Contacts from Survivors in Disaster Areas Using Multi-hop Wireless Transmissions -- Performance Evaluation of Mobile IPv6 Wireless Test-Bed i…
The Psychological Basis of Cognitive Modeling -- Parallel and Distributed Logic Programming -- Distributed Reasoning by Fuzzy Petri Nets: A Review -- Belief Propagation and Belief Revision Models in Fuzzy Petri Nets -- Building Expert Systems Using Fuzzy Petri Nets -- Distributed Learning Using Fuzzy Cognitive Maps -- Unsupervised Learning by Fuzzy Petri Nets -- Supervised Learning by a Fuzzy P…
MIMO -- MPLS -- Ad Hoc Networks (I) -- TCP (I) -- Routing (I) -- Ad Hoc Networks (II) -- TCP (II) -- Routing (II) -- Ad Hoc Networks (III) -- Signal Processing -- Routing (III) -- Mobility -- Performance (I) -- Peer-to-Peer (I) -- Security (I) -- Performance (II) -- Peer-to-Peer (II) -- Security (II) -- Multicast (I) -- CDMA -- Security and Network Anomaly Detection -- Multicast (II) -- Network…
to SoC Design -- Platform-Centric SoC Design Methodology -- to UML and XML -- Library of Platform Objects -- UML Profile for Codesign Modeling Frame (CMF) -- Design Case Study: A Digital Camera -- Summary.Increasing system complexity has created a pressing need for better design tools and associated methodologies and languages for meeting the stringent time to market and cost constraints. Platf…
Wireless LAN -- Security I -- TCP and Congestion Control -- Wireless Ad Hoc Network Routing -- Network Measurement -- Routing -- Power Control in Wireless Networks -- QoS I -- High Speed Networks -- Wireless Networks I -- QoS II -- Wireless Ad Hoc Networks -- Network Design -- Peer to Peer Networks -- QoS III -- Security II -- Wireless Networks II -- Applications and Services -- Security III --…