Journal: IEEE Communications Letters

Volume 13, Issue 6

369 -- 371João J. O. Pires, Luís G. C. Cancela. Simplifying the error probability analysis in optical direct detection DPSK systems
372 -- 374Zihuai Lin, Branka Vucetic. Analytical upper bounds for convolutional coded CPM over rings
375 -- 377Xiantao Cheng, Yong Liang Guan. Mitigation of cross-modulation interference in UWB energy detector receivers
378 -- 380Dae-Young Kim 0001, Jinsung Cho. Active caching: a transmission method to guarantee desired communication reliability in wireless sensor networks
381 -- 383Guopeng Zhang, Hailin Zhang, Liqiang Zhao, Wei Wang, Li Cong. Fair resource sharing for cooperative relay networks using nash bargaining solutions
384 -- 386Jaewoo So. Opportunistic feedback with multiple classes in wireless systems
387 -- 389Athanasios D. Panagopoulos. Time varying interference statistical distribution for direct-to-user satellite applications
390 -- 392Redha M. Radaydeh. Impact of delayed arbitrary transmit antenna selection on the performance of rectangular QAM with receive MRC in fading channels
393 -- 395Howon Lee, Dong-Ho Cho. VoIP capacity analysis in cognitive radio system
396 -- 398Hanjin Lee, Dongwook Kim, Hyunsoo Yoon. Preamble allocation scheme using trajectory information for mobile relay stations
399 -- 401Máirtín O'Droma, Serban Meza, Yiming Lei. New modified saleh models for memoryless nonlinear power amplifier behavioural modelling
402 -- 404Zheng Ma, Bahram Honary, Pingzhi Fan, Erik G. Larsson. Stopping criterion for complexity reduction of sphere decoding
405 -- 407Rupaban Subadar, P. R. Sahu. Performance analysis of dual MRC receiver in correlated hoyt fading channels
408 -- 410Qinglin Zhao, Soung C. Liew, Yao Yu. Location update cost of distance-based scheme for PCS networks with CTRW model
411 -- 413Amer M. Magableh, Mustafa M. Matalgah. Moment generating function of the generalized α - μ distribution with applications
414 -- 416Haiyang Huang, Gang Wu, Shaoqian Li. Optimized non-unitary linear precoding for orthogonal space-time block codes
417 -- 419Kleber Vieira Cardoso, José Ferreira de Rezende. Accurate hidden markov modeling of packet losses in indoor 802.11 networks
420 -- 422Hong-Yu Gu, Chen-Yang Yang, Bernard Fong. Low-complexity centralized joint power and admission control in cognitive radio networks
423 -- 425Qinghua Wang, Tingting Zhang. Bottleneck zone analysis in energy-constrained wireless sensor networks
426 -- 428Peng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo, Shengbao Wang. Security weakness in a dynamic program update protocol for wireless sensor networks
429 -- 431Sangsu Jung, Malaz Kserawi, Dujeong Lee, June-Koo Kevin Rhee. Distributed potential field based routing and autonomous load balancing for wireless mesh networks
432 -- 434Kun-Ho Hong, SuKyoung Lee, Nada Golmie. Throughput study for admission control in IEEE 802.11 DCF with ARF
435 -- 437Xiaopeng Jiao, Jianjun Mu, Jing Song, Lihua Zhou. Eliminating small stopping sets in irregular low-density parity-check codes
438 -- 440Zheng Wang, Jie Luo 0001. Approaching blokh-zyablov error exponent with linear-time encodable/decodable codes
441 -- 443Young H. Jung, Hong Sik Kim, Yoonsik Choe. Ant colony optimization based packet scheduler for peer-to-peer video streaming
444 -- 446Guillermo Ibáñez, Alberto García-Martínez, Juan A. Carral, José M. Arco, Arturo Azcorra. Evaluation of tree-based routing ethernet
447 -- 449Jian Wang, Yanheng Liu, Cheng Zhang, Yu Jiao. Model for router-level internet topology based on attribute evolution
450 -- 452Marija Antic, Aleksandra Smiljanic, Graduate. Routing with load balancing: increasing the guaranteed node traffics
453 -- 455Yijin Zhang, Kenneth W. Shum, Wing Shing Wong. On pairwise shift-invariant protocol sequences
456 -- 458Wen-Long Chin, Sau-Gee Chen. IEEE 1588 clock synchronization using dual slave clocks in a slave
459 -- 461Joon Yoo, Sunwoong Choi, Chong-kwon Kim. The capacity of epidemic routing in vehicular networks
462 -- 464Pablo Velarde-Alvarado, César Vargas Rosales, Deni Torres Román, A. Martinez-Herrera. Detecting anomalies in network traffic using the method of remaining elements