monday tuesday wednesday november 17, 2008 · pdf filealgorithms and protocols ... huawei...
TRANSCRIPT
![Page 1: MONDAY TUESDAY WEDNESDAY November 17, 2008 · PDF fileAlgorithms and Protocols ... Huawei Technologies MCS-10.7 A Semiblind Adaptive Beamformer Using a Parallel Pilot Signal for WCDMA](https://reader030.vdocuments.site/reader030/viewer/2022020315/5aadb0b67f8b9aa9488ea56c/html5/thumbnails/1.jpg)
UN
CLA
SSIF
IED
SES
SIO
NS
38
ACT-2 Advanced Antenna TechnologiesRoom 10 9:15 a.m. – 12:00 p.m.This session focuses on state-of-the-art advanced technologies in the antenna related areas, including innovative UUV antenna design, multi-frequency synchronous oscillator antenna, SoftWear antenna, Z-interconnect and metamaterial.
Session Chair/Organizer: Yueh-Chi Chang, Raytheon
ACT-2.1 Simultaneous, Multi-Frequency Synchronous Oscillator AntennaTed Heath, GTRIRobert R. Kerr, GTRI Glenn D. Hopkins, GTRI Barry Sharp, GTRI Brian Meadows, SPAWAR Systems CenterJohn Cothern, SPAWAR Systems Center
ACT-2.2 Compact UUV Antenna Assembly for Reliable CommunicationsRod Waterhouse, Pharad, LLCDalma Novak, Pharad, LLC
ACT-2.3 SoftWear AntennaPekka Salonen, Patria Aviation OyMikko Keskilammi, Sasken Finland Oy
ACT-2.4 Enabling High-Performance RF Designs Using Z-Interconnect: Materials, Manufacturing and Electrical PerformanceMichael J. Rowlands, Endicott Interconnect Technologies Rabindra N. Das, Endicott Interconnect Technologies John Lauffer, Endicott Interconnect Technologies
ACT-2.5 Dielectric Breakdown of Electromagnetic Metamaterials in the Mean-Field ApproximationJeffrey Boksiner, US Army RDECOM CERDECTimothy Bocskor, US Army RDECOM CERDEC
ACT-2.6 Modal Analysis of One-Dimensional Electromagnetic Metamaterial Grounded SlabJeffrey Boksiner, US Army RDECOM CERDECGlenn Minko, US Army RDECOM CERDEC
ACT-2.7 Spherical Shell of Eng Metamaterial Surrounding a Dipole AntennaGeorg K. Karawas, US Army CERDEC S&TCDRobert E. Collin, Case Western Reserve University
ACT-3 Optical Communications: Systems and Network Technologies, Algorithms and ProtocolsRoom 4 9:15 a.m. – 12:00 p.m.This session focuses on two areas: 1) Embedding of fi ber optic local area network on airborne platforms; 2) Directional RF and free space optical (FSO) communications systems, networking technologies, algorithms, and protocols. The papers included in this session cover a broad range of topics, such as architectural requirements on optical avionic networks, underwater laser communication systems and challenge, fading mitigation, topology formation, routing, and DTN technologies for directional RF and FSO networks. Discussion will be focused on recent advances in these technologies and their effectiveness in solving communications and networking challenges for the military.
Session Chair: Vincent Chan, Massachusetts Institute of Technology
Session Organizer: Reggie Brothers, BAE Systems
ACT-3.1 A Cross-Layer Approach to Mitigate Fading on Bidirectional Free-Space Optical Communication LinksStuart D. Milner, Techno-Sciences Sugianto Trisno, Techno-Sciences Christopher C. Davis, University of Maryland Bernhard Epple, Institute of Communications and Navigation Hennes Henniger, Institute of Communications and Navigation
ACT-3.2 An Approach to Reducing SWaP and Cost for Avionics High-Speed Optical Data Networks Naresh Chand, BAE Systems Kevin McNeill, BAE SystemsSrikanta Kumar, BAE SystemsBruce Eteson, BAE Systems
ACT-3.3 Spatial and Temporal Dispersion in High Bandwidth Underwater Laser Communication Links Brandon Cochenour, NAVAIR Linda Mullen, NAVAIR Alan Laux, NAVAIR
ACT-3.4. Requirements and Challenges for Tactical Free-Space LasercommSantanu Das, Offi ce of Naval Research Hennes Henniger, German Aerospace Center Bernhard Epple, German Aerospace Center Christopher I. Moore, Naval Research Laboratories William Rabinovich, Naval Research Laboratories Raymond Sova, Johns Hopkins University/APLDavid Young, Johns Hopkins University/APL
ACT-3.5 A Case for Embedded Optical CommunicationsLeMonté Green, The Central City Corp.Paul B. Ruffi n, US Army RDECOM/AMRDECJames C. Holt, US Army RDECOM/AMRDEC Jones S. Hamilton, US Army RDECOM/AMRDEC Reginald J. Turner, Air Force Institute of TechnologyKelvin Gallman, US Marines Corp
ACT-3.6 DTN-Based Free-Space Optical and Directional RF NetworksRobert A. Nichols, Johns Hopkins University/APL A. Roger Hammons Jr., Johns Hopkins University/APL
ACT-3.7 Topology Formation for Tactical Networks with Directional RF and Free-Space Optical LinksKyle Guan, BAE SystemsReza Ghanadan, BAE SystemsKevin McNeill, BAE Systems Srikanta Kumar, BAE Systems
AMS-2 Modeling Network Optimization and UtilizationRoom 11A 9:15 a.m. – 12:00 p.m.This session is focused on the use of modeling and simulation to evaluate protocols, optimize utilization and allocate resources to predict and enhance network performance. Network modeling tools are described and practical examples given of the effective use of these tools.
Session Chair/Organizer: Thomas H. Curtis, Johns Hopkins University/APL
AMS-2.1 Reasoning and Resource Allocation for Sensor-Mission Assignment in a Coalition ContextA. Preece, Cardiff UniversityD. Pizzocaro, Cardiff UniversityK. Borowiecki, Cardiff UniversityG. de Mel, University of AberdeenM. Gomez, University of Aberdeen W. Vasconcelos, University of Aberdeen A. Bar-Noy, City University of New York M. P. Johnson, City University of New YorkT. La Porta, Pennsylvania University H. Rowaihy, Pennsylvania University G. Pearson, DTSL, Great MalvernT. Pham, US Army Research Lab
AMS-2.2 The Network Protocol Evaluation with the Hybrid Operational Protocol Evaluation ToolAlexey Rudenko, Booz Allen Hamilton Choo Chin Tan, UCLA
TUESDAY MORNING
MONDAYNovember 17, 2008
WEDNESDAYNovember 19, 2008
TUESDAYNovember 18, 2008
![Page 2: MONDAY TUESDAY WEDNESDAY November 17, 2008 · PDF fileAlgorithms and Protocols ... Huawei Technologies MCS-10.7 A Semiblind Adaptive Beamformer Using a Parallel Pilot Signal for WCDMA](https://reader030.vdocuments.site/reader030/viewer/2022020315/5aadb0b67f8b9aa9488ea56c/html5/thumbnails/2.jpg)
UN
CLA
SSIF
IED
SES
SIO
NS
39
AMS-2.3 A Practical Routing Strategy in Delay-Tolerant Networks Using Multiple PigeonsHui Guo, NISTYi Qian, NIST Jiang Li, Howard UniversityYe Tian, Howard University
AMS-2.4 Design Approaches for STEALTHY Probing Mechanisms in Battlefi eld NetworksShriram Ganesh, University of DelawareMaitreya Natu, University of Delaware Adarshpal Sethi, University of DelawareRichard Gopaul, US Army Research Lab Rommie Hardy, US Army Research Lab
AMS-2.5 Deception Jamming Modeling in Radar Sensor NetworksJonathan Schueger, Miami University Dmitriy Garmatyuk, Miami University
AMS-2.6 A DEVS-Based Framework for Simulation Optimization: Case Study of Link-11 Gateway Parameter TuningHojun Lee, University of Arizona Bernard P. Zeigler, University of Arizona Doohwan Kim, RTSync Corp
AMS-2.7 System Integration of GPSR and ADS-B for Aeronautical Ad-Hoc NetworksDong-Woo Seo, POSTECH, S. Korea Sok-Hyong Kim, POSTECH, S. KoreaYoung-Joo Suh, POSTECH, S. Korea
AMS-8 Modeling Tools and TechniquesRoom 5A 9:15 a.m. – 12:00 p.m.This session covers Modeling and Simulation techniques for the purpose of performance analysis. These papers include performance analysis of wireless networks as well as analysis of specifi c algorithms and protocols.
Session Chair: Tom Stayonoff, Raytheon
Session Organizer: Deanna Harden, Raytheon
AMS-8.1 Tactical Edge Network Emulation Tool (TENET): A Tool for Connectivity Analysis for Tactical Scenarios Daniel Tebben, Johns Hopkins UniversityAnurag Dwivedi, Johns Hopkins UniversityJason Madsen, Johns Hopkins UniversityJeff Garretson, Johns Hopkins UniversityTim Frey, Johns Hopkins UniversityWilliam Turner, Johns Hopkins University
AMS-8.2 A Comparison of Near Earth Propagation Models over Layered Media Ruth Belmonte, RemcomStephen Fast, RemcomJoseph Schuster, Remcom
AMS-8.3 Modeling Temporal Channel Variations in Indoor Wireless Environments Aliye Özge Kaya, Rutgers UniversityLarry Greenstein, Rutgers UniversityWade Trappe, Rutgers University
AMS-8.4 Understanding the Weichselberger Model: A Detailed Investigation Leslie Wood, University of California San DiegoWilliam Hodgkiss, University of California San Diego
AMS-8.5 Propagation Models for Mobile Terrestrial VHF Communications P.J. Vigneron, Communications Research Centre CanadaJ.A. Pugh, Communications Research Centre Canada
AMS-8.6 Markovian Approach to Model Underwater Acoustic Channel: Techniques Comparison F. Pignieri, University of CalabriaF. De Rango, University of CalabriaF. Veltri, University of CalabriaS. Marano, University of Calabria
AMS-8.7 SWarMM - A Mobility Modeling Tool for Tactical Military NetworksPeter Holliday, University of New South Wales
IAS-3 Information Assurance in Tactical Military CommunicationsRoom 5B 9:15 a.m. – 12:00 p.m.Information Security challenges in Military/Government Communications Systems are numerous and application requirements can be extreme. Factors such as the operating environment, performance requirements, performance period, threat level and the cost of a compromise, sometimes require novel solutions to otherwise traditional security problems. This session will provide a forum for presentation on advances in the application of Information Security technology to Tactical Military Communication Systems. Areas of interest include: Methods for Key Management, Source Authentication, Data Integrity Verifi cation and Access Control. Other potential topics include advances in Network Intrusion Detection, Robust Secure Protocols and Cryptographic Methods and Cryptanalysis for Government/Military applications.
Session Chair/Organizer: Michael T. Kurdziel, Harris
IAS-3.1 Implementing Effi cient 384-Bit NIST Elliptic Curve over Prime Fields on an ARM946ETracy VanAmeron, HarrisWilliam Skiba, Harris
IAS-3.2 A Case for a Parallelizable HashAlan Kaminsky, Rochester Institute of TechnologyStanislaw P. Radziszowski, Rochester Institute of Technology
IAS-3.3 The Secure Communication Interoperability Protocol (SCIP) over a VHF/UHF Radio ChannelJohn Alvermann, HarrisMichael Kurdziel, Harris
IAS-3.4 Secure Communications over Hybrid Military NetworksVamsi Paruchuri, University of Central ArkansasArjan Durresi, Purdue UniversitySriram Chellappan, Missouri University of Science and Technology
IAS-3.5 Multi-Domain Trust Management in Variable-Threat Environments Using Rollback-AccessMike Burmester, Florida State UniversityPrasanta Das, MITREMartin Edwards, MITREAlec Yasinsac, University of South Alabama
IAS-3.6 Providing Secure Interoperability While Maintaining SovereigntyTodd Moore, Harris
IAS-3.7 On the Security and Robustness of Encryption via Compressed Sensing Adem Orsdemir, University of RochesterH. Oktay Altun, University of RochesterGaurav Sharma, University of RochesterMark F. Bocko, University of Rochester
MCS-4 Signal Processing for Communication ApplicationsRoom 15A 9:15 a.m. – 12:00 p.m.The papers in this session discuss signal processing techniques that have direct application to communication systems.
Session Chair/Organizer: Fred Harris, San Diego State University
MCS-4.1 On Implementation of Sampling with Internal Anti-Aliasing Filtering in Software Defi ned ReceiversYefi m Poberezhskiy, SAICDennis Braunreiter, SAIC
MCS-4.2 Multiple-Sample Processing for Increasing the A/D Resolution Yefi m Poberezhskiy, SAIC
MCS-4.3 Doppler Shift Cancellation Using Phasor and Split-Phasor LMS Algorithms Lan Nguyen, LinQuestRichard Wells, University of Idaho
MCS-4.4 Phase and Amplitude Jitter Cancellation Using 1-Step LMS Linear Predictor Lan Nguyen, LinQuestRichard Wells, University of Idaho
TUESDAY MORNING
MONDAYNovember 17, 2008
WEDNESDAYNovember 19, 2008
TUESDAYNovember 18, 2008
![Page 3: MONDAY TUESDAY WEDNESDAY November 17, 2008 · PDF fileAlgorithms and Protocols ... Huawei Technologies MCS-10.7 A Semiblind Adaptive Beamformer Using a Parallel Pilot Signal for WCDMA](https://reader030.vdocuments.site/reader030/viewer/2022020315/5aadb0b67f8b9aa9488ea56c/html5/thumbnails/3.jpg)
UN
CLA
SSIF
IED
SES
SIO
NS
40
MCS-4.5 On Joint Cancellation of Doppler Shift, Phase Jitter, and Amplitude Jitter Lan Nguyen, LinQuestRichard Wells, University of Idaho
MCS-4.6 Sensing and Control in Bandwidth-Limited Systems: A Kalman Filter Approach Gregory Barnette, Air Armament Center, Eglin AFBJohn Shea, University of FloridaWarren Dixon, University of Florida
MCS-4.7 A Straightforward, General-Purpose, Robust Adaptive IIR FilterAaron Chesir, MITRE
MCS-10 Multiple Access CommunicationsRoom 14B 9:15 a.m. – 12:00 p.m.The papers presented in this session primarily address different aspects of Code Division Multiple Access (CDMA).
Session Chair: Richard Kurth, Raytheon
Session Organizer: John Hines, AFRL
MCS-10.1 MOE-Based Carrier Tracking for Multicarrier CDMA SystemsJames Lehnert, Purdue UniversityShun-Te Tseng, Purdue University
MCS-10.2 The Effects of Spatial Diversity and Imperfect Channel Estimation on Multi-Carrier CDMA Systems Andrew Ling, SPAWAR Systems Center Pacifi cLaurence Milstein, University of California, San Diego
MCS-10.3 Time Hopping Direct-Sequence CDMA for Asynchronous Transmitter-Only Sensors Jianqiang Zeng, University of Texas at DallasHlaing Minn, University of Texas at DallasLakshman Tamil, University of Texas at Dallas
MCS-10.4 Comparison of CS-CDMA and MC-CDMA: BER and PAPR Hongbing Cheng, Stevens Institute of TechnologyYu-Dong Yao, Stevens Institute of TechnologyBingli Jiao, Peking University
MCS-10.5 Throughput Optimization for Multi-User Interference Channels Xiaohu Shang, Syracuse UniversityGerhard Kramer, Bell-labs, Alcatel-Lucent,Biao Chen, Syracuse University
MCS-10.6 A Priority-Based Adaptive CDMA Scheme for Multimedia Wireless System Adeyemi Abel Ajibesin, University of Cape Town Keith Ferguson, Meraka InstituteMqhele Dlodlo, University of Cape Town H Anthony Chan, Huawei Technologies
MCS-10.7 A Semiblind Adaptive Beamformer Using a Parallel Pilot Signal for WCDMA Systems Sheng-Luen Wei, University of California, Santa BarbaraJohn J. Shynk, University of California, Santa Barbara
NCS-8 Network-Centric Enabling Sciences and TechnologyRoom 16A 9:15 a.m. – 12:00 p.m.This session encompasses papers that investigate the sciences and technology that enable net-centricity that makes the projected benefi ts of net-centric applications possible. The objective of the presented research is aimed at enabling the Enterprise starting with the physical layer and its security including cross domain and moving up to the applications over the Global Information Grid (GIG). The outcome of these papers is particularly benefi cial for developing robust applications, methods for data access and sharing, datalinks for data communications and providing situational awareness for the warfi ghter and strategic assets.
Session Chair/Organizer: Grace Crowder, National Security Agency
NCS-8.1 Mitigating Naval Network Instabilities with Disruption-Tolerant NetworkingC. Rigano, MITREK.Scott, MITREJ. Bush, MITRER. Edell, MITRES. Parikh, MITRER. Wade, MITREB. Adamson, US Naval Research Laboratory
NCS-8.2 Energy Effi cient Scheduling in Networks with Correlated DataRazvan Cristescu, Technical University of Eindhoven
NCS-8.3 Multiple-Access Capacity Gains Using Multi-User Detection under Uniform Linear Power SpacingJoshua D. Niedzwiecki, BAE Systems Brandon P. Hombs, BAE Systems Joseph A. Farkas, BAE Systems Yiftach Eisenberg, BAE Systems John A. Tranquilli, BAE Systems
NCS-8.4 A Hidden Markov Model-Based Approach to Detect Rogue Access PointsGayathri Shivaraj, Old Dominion University Min Song, Old Dominion University Sachin Shetty, Old Dominion University
NCS-8.5 Use of Markov Chain in Atmospheric Channel Modeling of Free-Space Laser CommunicationsZeinab Hajjarian, Pennsylvania State University Jarir Fadlullah, Pennsylvania State UniversityMohsen Kavehrad, Pennsylvania State University
NCS-8.6 Role of Policy-Based Enterprise Management in GIG NetOpsSitaram Kowtha, Johns Hopkins University/ APLPrabha Kumar, DISANarendra Kumar, DISAGaness Shiwmangal, DISABrian Fuchs, DISASteven Crum, DISAJaime Medero, DISAXi Jiang, Johns Hopkins University/ APLAmanpreet Johal, Johns Hopkins University/ APLAnil John, Johns Hopkins University/ APLEdward Chow, NASA/Caltech-JPLHsin-Ping Chang, NASA/Caltech-JPLMark James, NASA/Caltech-JPLAndrew Mayer, Telcordia TechnologiesGlen MacArthur, Telcordia Technologies
NCS-9 Systems Interoperability and Cross Domain SolutionsRoom 6F 9:15 a.m. – 12:00 p.m. This session focuses on networking interoperability and attempts to specifi cally investigate crossing the multiple security domains in use by the DoD and the IC. Cross Domain Solutions (CDS) are key to information sharing and ubiquitous data access. The technologies in this area have been growing signifi cantly and the standards for the DoD and the IC for cross domain are still being established. This session provides a forum to discuss the various enabling technologies and mapping them to the emerging warfi ghter needs.
Session Chairs/Organizers: Bassam S Farroha, Northrop Grumman and Melinda Whitfi eld, DoD
NCS-9.1 Demonstrating New Tactical Capabilities with Heterogeneous Network-Enabled Systems: The Phoenix 2007 ExperimentChristophe Guettier, SAGEM DSGeraud Allard, SAGEM DSJacquies Yelloz, SAGEM DSVincent Hutric, SAGEM DSArmaud Desbois, Armee-FrancaiseNicolas Perche, Armament Procurement Agency
NCS-9.2 Satisfying Warfi ghter Information Imperatives Across Security Domains Bassam Farroha, Northrop Grumman Melinda Whitfi eld, DoDKathleen Stewart, UCDMO Brian Tague, Northrop Grumman
MONDAYNovember 17, 2008
WEDNESDAYNovember 19, 2008
TUESDAYNovember 18, 2008
TUESDAY MORNING
![Page 4: MONDAY TUESDAY WEDNESDAY November 17, 2008 · PDF fileAlgorithms and Protocols ... Huawei Technologies MCS-10.7 A Semiblind Adaptive Beamformer Using a Parallel Pilot Signal for WCDMA](https://reader030.vdocuments.site/reader030/viewer/2022020315/5aadb0b67f8b9aa9488ea56c/html5/thumbnails/4.jpg)
UN
CLA
SSIF
IED
SES
SIO
NS
41
NCS-9.3 Effect of Security Architecture on Cross-Layer Signaling in Network-Centric Systems George Elmasry, DSCI Manoj Jain, DSCI Junghoon Lee, DSCI
NCS-9.4 Toward an Adaptive Data Distribution Service for Dynamic Large-Scale Network-Centric Operation and Warfare (NCOW) Systems Nanbor Wang, Tech-X Douglas Schmidt, Vanderbilt University Hans van’t Hag, PrismTech Angelo Corsaro, PrismTech
NCS-9.5 Energy Aware and Bandwidth Effi cient Mobility Architecture for 6LoWPAN Gargi Bagh, Ajou University, South Korea Hamid Mukhtar, Ajou University, South Korea Muhammad Taqi Raza, Ajou University, South Korea Ali Hammad Akbar, Ajou University, South Korea Saif Shams, Ajou University, South Korea Ki-Hyung Kim, Ajou University, South Korea Seung-Wha Yoo, Ajou University, South Korea Donghwa Kim, Ajou University, South Korea
NCS-9.6 Hybrid Multicast Patching Approach for Video Services Sung-Kwon Park , Hanyang University, South KoreaSaewoong Bahk, Seoul National University, South Korea Can Li, Seoul National University, South Korea
NCS-10 Information Assurance in a Network-Centric EnvironmentRoom 11B 9:15 a.m. – 12:00 p.m.This session addresses Information Assurance in a Network-Centric Environment. Information Assurance is one of the most diffi cult challenges in architecting tactical networks. Some papers in this session address resilience techniques, others consider increasing security of information fl ow in the network, while some others have the focus on detecting denial-of-service attacks and defending against malicious nodes. This session also considers how Information Assurance affects QoS architecture and how to improve QoS mitigation techniques that try to overcome the challenges of Information Assurance.
Session Chair/Organizer: George F. Elmasry, DSCI
NCS-10.1 Measuring Resilience in Multi-Carrier Emergency and Critical Telecommunications SystemsDenise M. Masi, NoblisMartin J. Fischer, NoblisDavid A. Garbin, NoblisLane Martin, National Communications SystemsPatrick V. McGregor, Nyquetek
NCS-10.2 Secure ATC Surveillance for Military ApplicationsLarry Kenney, Raytheon Joe Dietrich, Raytheon Jerry Woodall, Raytheon
NCS-10.3 LD2: A System for Lightweight Detection of Denial-of-Service AttacksSirikarn Pukkawanna, National Electronics and Computer Technology Center, ThailandPanita Pongpaibool, National Electronics and Computer Technology Center, ThailandVasaka Visoottiviseth, Mahidol University, Thailand
NCS-10.4 Defending Against Malicious Nodes Using an SVM-Based Reputation SystemRehan Akbani, University of Texas at San AntonioTurgay Korkmaz, University of Texas at San AntonioG. V. S. Raju, University of Texas at San Antonio
NCS-10.5 Analysis of Adaptive WRED and CBWFQ Algorithms on the Tactical EdgeMing-Jye Sheng, MITRE Kun I. Park, MITRE Thomas Mak, US Army
NPM-5 Emerging Wireless Networking TechnologiesRoom 6E 9:15 a.m. – 12:00 p.m.GIG Networks are increasingly incorporating emerging networking standards being developed within committees and work groups like the IETF. New standards or enhancements to existing standards are also being developed to address unique GIG requirements. Papers in this session explore the role of emerging networking standards within the GIG. Specifi cally, these papers look at issues and the role of standards in key areas such as routing and security.Session Chair/Organizer: Dilip S. Gokhale, Lockheed Martin
NPM-5.1 Multi-Channel MAC Protocol for Multi-Hop Wireless Networks: Handling Multi-Channel Hidden Node Problem Using SnoopingMyunghwan Seo, Information and Communications University Yonggyu Kim, Information and Communications University Joongsoo Ma, Information and Communications University
NPM-5.2 A Novel Distributed MIMO Aware MAC Protocol Design with a Markovian Framework for Performance EvaluationYaoqing Yang, UNLTing Zhou, UNLSteven Eggerling, UNLZhangdui Zhong, BJUTHamid Sharif, UNL
NPM-5.3 Cognitive Radio Network Setup without a Common Control ChannelPrathima Agrawal, Auburn UniversityYogesh Kondareddy, Auburn University Krishna Sivalingam, University of Maryland
NPM-5.4 Adaptive Traffi c-Shaping Tuong Le, Lockheed Martin Brian Rossa, Lockheed Martin
NPM-5.5 Strategies for Time-based Multi-Path Secure Information Disseminations in MANETsXiaoyan Hong, University of AlabamaBo Gu, University of AlabamaQunwei Zheng, University of Alabama
NPM-5.6 An Interference and QoS Aware Distributed Scheduling Approach for Hybrid IEEE 802.16e Mesh NetworksRahul Amin, Clemson UniversityKuang-Ching Wang, Clemson UniversityParmesh Ramanathan, University of Wisconsin
RST-4 Software Defined RadioRoom 3 9:15 a.m. – 12:00 p.m.This session is dedicated to papers that address theoretical concepts, design techniques, implementation approaches, and applications in the fi eld of Software Defi ned Radio. This session covers several important military communications topics. Included are papers dealing with error budget analysis, on-line mode switching, security and MIMO architectures, mapping of signal strength across a network and performance evaluation of turbo-coded OFDM waveform.
Session Chair/Organizer: Anton G. Moldovan, Northrop Grumman
RST-4.1 Testing Methods and Error Budget Analysis of a Software Defi ned RadioRichard Overdorf, Agilent Technologies
RST-4.2 Design and Implementation of Online Mode Switching on Hybrid Software Radio PlatformsYahia Tachwali, University of OklahomaFadi Basma, University of Oklahoma Mustafa Chmeiseh, University of Oklahoma Hazem H. Refai, University of Oklahoma
RST-4.3 On the Architecture of Secure Software Defi ned RadiosJohn A. Davidson, SAIC
RST-4.4 A Case Study of a MIMO SDR ImplementationXiaolong Li, University of California, IrvineWeihong Hu, University of California, IrvineHomayoun Yousefi ’zadeh, University of California Akber Qureshi, Boeing
MONDAYNovember 17, 2008
WEDNESDAYNovember 19, 2008
TUESDAYNovember 18, 2008
TUESDAY MORNING
![Page 5: MONDAY TUESDAY WEDNESDAY November 17, 2008 · PDF fileAlgorithms and Protocols ... Huawei Technologies MCS-10.7 A Semiblind Adaptive Beamformer Using a Parallel Pilot Signal for WCDMA](https://reader030.vdocuments.site/reader030/viewer/2022020315/5aadb0b67f8b9aa9488ea56c/html5/thumbnails/5.jpg)
UN
CLA
SSIF
IED
SES
SIO
NS
42
RST-4.5 Compressed Mapping of Communication Signal StrengthYasamin Mostofi , University of New MexicoPradeep Sen, University of New Mexico
RST-4.6 Performance of Turbo Coded OFDM System with Comb Pilot Channel Estimation in Rayleigh Fading ChannelSaid M. Elnoubi, Alexandria UniversityShawki Shaban, Alexandria UniversitySherif Samir A. Elbadawy, Alexandria University
SAC-2 SATCOM On-The-Move (SOTM)Room 15B 9:15 a.m. – 12:00 p.m.This session focuses on some of the challenges facing the design of Satellite Communications (SATCOM) On-The-Move (SOTM) systems for use with both DoD and commercial satellites. The session includes discussion of key evolving SOTM technologies, design drivers for SATCOM On-The-Move (SOTM) earth terminals, key regulatory issues (both domestic and international) associated with mobile SATCOM and satellite link modeling and engineering in various environments operating OTM. Some of the papers will address current SOTM development programs that have been identifi ed for future use by the US warfi ghter.
Session Chair/Organizer: Richard Wexler, MITRE
SAC-2.1 Capacity and Regulatory Study on the Potential Use of Satellite On-The-Move Terminals at X-BandLino Gonzalez, LinQuestGerald Michael, US Army CERDEJoseph Shields, US Army CERDECarl Swenson, US Army CERDE
SAC-2.2 A Statistical Approach to Specifying the Off-Axis EIRP Spectral Density in On-The-Move Satellite CommunicationsVijitha Weerackody, Johns Hopkins/APLEnrique Cuevas, Johns Hopkins/APL
SAC-2.3 Shock Isolation for Mobile Pointed SATCOM SystemsJames DeBruin, General Dynamics
SAC-2.4 Picking the Winners in Large-Scale Ground-Vehicle SATCOM On-The-Move DeploymentsJesse Ortega, General Dynamics James DeBruin, General Dynamics
SAC-2.5 Implementing a Mobility Architecture for a Regenerative Satellite Mesh Architecture (RSM-A) System – A SPACEWAY™ PerspectiveSteven Arnold, Hughes Network Systems Anthony Noerpel, Hughes Network Systems Rajeev Gopal, Hughes Network Systems Sridhar Chandrasekharan, Hughes Network Systems
SAC-2.6 An Improved Markov Model for the Urban SOTM ChannelTim Gillespie, Naval Postgraduate SchoolClark Robertson, Naval Postgraduate School
WMC-1 Multiple Antenna Systems – IRoom 2 9:15 a.m. – 12:00 p.m.One of the challenges in net-centric operations is to provide universal connectivity with high levels of communication performance across diverse military environments. Multiple-input multiple-output (MIMO) radio techniques, in which multiple antennas are used by both the transmitter and the receiver, offer the potential for signifi cant enhancements in spectral effi ciency and link reliability. This session covers some MIMO research topics that are of particular interest to military communications, including: combining MIMO with ad-hoc networking, include cross-layer optimizations, channel measurement in frequency bands used by military communications and receiver technologies.
Session Chair/Organizer: Feng Ouyang, John Hopkins University/APL
WMC-1.1 On the Performance of MIMO-Based Ad-Hoc Networks Under Imperfect CSIJia Liu, Virginia Polytechnic Y. Thomas Hou, Virginia Polytechnic
WMC-1.2 A Graph Theoretical Algorithm for Virtual MIMO Channel Selection in Wireless Sensor NetworksJing Liang, UTAQilian Liang, UTA
WMC-1.3 Concurrent Link Capacity of MIMO Ad-Hoc Networks with QoS ConstraintPengkai Zhao, UCLABabak Daneshrad, UCLAMario Gerla, UCLAGuangyu Pei, Boeing Jae H. Kim, Boeing
WMC-1.4 MIMO Channel Measurements for Urban Military ApplicationsJerry Hampton, Johns Hopkins University/APLManuel Cruz, Johns Hopkins University/APL Naim Merheb, Johns Hopkins University/APL A. Roger Hammons Jr., Johns Hopkins University/APL Douglas Paunil, Johns Hopkins University/APLFeng Ouyang, Johns Hopkins University/APL
WMC-1.5 Urban Peer-to-Peer MIMO Channel Measurements and Analysis at 300 MHzPeter Holm, Swedish Defence Research AgencyFredrik Tufvesson, Lund UniversityAndreas Molisch, Lund UniversityGunnar Eriksson, Swedish Defence Research AgencySara Linder, Swedish Defence Research AgencyKia Wiklundh, Swedish Defence Research AgencyPeter Johansson, Swedish Defence Research Agency
WMC-1.6 Channel Mismatch Compensation for Space-Time Adaptive ProcessorsNeil Tisdale, University of SouthamptonTom Kazmierski, University of SouthamptonDuncan Brooks, ERA Technology
WMC-1.7 An Analysis of the Effi cient Size of a MIMO System for Full Multiplexing in 16-QAM SignalingSoonchul Park, Kyungpook National University, Korea Dong Seog Han, Kyungpook National University, KoreaJaechan Lee, Kyungpook National University, Korea
WMC-8 Physical Layer Issues for Wireless CommunicationsRoom 6D 9:15 a.m. – 12:00 p.m.This session primarily deals with the design of novel physical layer solutions for enabling enhanced quality of data transmission in application-specifi c wireless networks.
Session Chair: Alexander Wyglinski, Worcester Polytechnic Institute
Session Organizer: Christopher Anderson, United States Naval Academy
WMC-8.1 Joint AOA/RSSI Based Multi-User Location System for Military Mobile Base-StationJeongsu Lee, Information and Communications UniversityNa Young Kim, Information and Communications UniversitySujin Kim, Information and Communications UniversityJoonhyuk Kang, Information and Communications UniversityYoungok Kim, Kwangwoon University
WMC-8.2 Tactical Services Providers: Wireless Extension Design and Performance AnalysisBruce Bennett, DISA Joseph Greeves, Booz Allen HamiltonPamela Hemmings, Booz Allen Hamilton
WMC-8.3 RF Coverage Verifi cation Issues in Public Safety CommunicationsEric Salgado, SSC San DiegoVeena Gadwal, SSC San DiegoJason Heger, SSC San DiegoBrian Hobson, SSC San DiegoDaniel Devasirvatham, SSC San Diego
TUESDAY MORNING
MONDAYNovember 17, 2008
WEDNESDAYNovember 19, 2008
TUESDAYNovember 18, 2008
![Page 6: MONDAY TUESDAY WEDNESDAY November 17, 2008 · PDF fileAlgorithms and Protocols ... Huawei Technologies MCS-10.7 A Semiblind Adaptive Beamformer Using a Parallel Pilot Signal for WCDMA](https://reader030.vdocuments.site/reader030/viewer/2022020315/5aadb0b67f8b9aa9488ea56c/html5/thumbnails/6.jpg)
UN
CLA
SSIF
IED
SES
SIO
NS
43
WMC-8.4 Fidelity at High Speed: Wireless InSite® Real Time Module™Ronald Eichenlaub, RemcomClark Valentine, RemcomStephen Fast, RemcomSam Albarano, Remcom
WMC-8.5 Blind Estimation of Transmit-Power for Multiple Wireless SourcesIvan Weing –Hei Ho, Imperial College, London Bong Jun Ko, IBM Murtaza Zafer, IBM
WMC-8.6 Complexity Reduction of Markov Channel Models for Wireless Networks Using Graph TheoryHassaan Khaliq Qureshi, NUST, PakistanKhurram Shehzad, NUST, PakistanSyed Ali Khayam, NUST, PakistanMuttukrishnan Rajarajan, City University, LondonVeselin Rakocevic, City University, London
WMC-8.7 Optimal Channel Assignment for Multi-Channel Multi-Radio Wireless NetworksLiangping Ma, Argon STChien-Chung Shen, University of Delaware
WSN-3 Cross-Layer Analysis and Design in Mobile Ad-Hoc NetworksRoom 6C 9:15 a.m. – 12:00 p.m.Traditional protocol stacks for communication systems typically design the link and network layers with limited interfaces that make simple assumptions about the performance of the other layers. However, for Mobile Ad-Hoc Networks the wireless links are highly dynamic and unreliable, and coordination between the actions taken at different layers is required to achieve effi cient communications. Recently there has been much interest in improving network performance by accounting for and adapting to the wireless environment through joint design of protocols at the different layers. In the session, various approaches to cross-layer analysis and protocol design are presented.
Session Chair/Organizer: Harlan B. Russell, Clemson University
WSN-3.1 Analyzing Finite MANETs by Transformations to Equivalent Static GraphsDinesh C. Verma, IBM Bong Jun Ko, IBM Ananthram Swami, Army Research Laboratory
WSN-3.2 A General Framework for the Capacity Analysis of Wireless Ad-Hoc NetworksHyunchul Kim, University of California, Santa CruzZheng Wang, University of California, Santa CruzHamid R. Sadjadpour, University of California, Santa CruzJ.J. Garcia-Luna-Aceves, Palo Alto Reaserch Center (PARC)
WSN-3.3 Minimum Schedule Lengths with Rate Control in Wireless NetworksAnna Pantelidou, University of Maryland Anthony Ephremides, University of Maryland
WSN-3.4 Capacity, Bandwidth and Available Bandwidth Concepts for Wireless Ad-Hoc NetworksMarco A. Alzate, Universidad Distrital, ColombiaNestor M. Pena, Universidad de los Andes, ColombiaMiguel A. Labrador, University of South Florida
WSN-3.5 Cross-Layer On-Demand Routing Algorithms for Multi-Hop Wireless CSMA/CA NetworksJu-Lan Hsu, University of California, Los AngelesIzhak Rubin, University of California, Los Angeles
WSN-3.6 Multiple Partner Selection in Cooperative OFDM Networks Using an Auction StrategyAmitav Mukherjee, University of CaliforniaHyuck M. Kwon, Wichita State University
WSN-3.7 A Cross-Layer Approach to Multi-Hop Networking with Cognitive RadiosYi Shi, Virginia Polytechnic Institute Y. Thomas Hou, Virginia Polytechnic Institute Sastry Kompella, Naval Research Laboratory
WSN-8 Commercial Cellular and Wireless Networking Technology for Military ApplicationsRoom 9 9:15 a.m. – 12:00 p.m.Commercial cellular and other wireless networking technologies continues to receive increasing interest in its potential use for military applications. However, these technologies have not necessarily been designed to meet military requirements. This session considers commercial cellular, WLAN, and WPAN technologies, with papers addressing performance modeling, performance optimizations and potential modifi cations that can improve performance.
Session Chair: William T.M. Kasch, Johns Hopkins University/APL
Session Organizer: Jack L. Burbank, Johns Hopkins University/APL
WSN-8.1 Optimization of Relaying Topology in Cellular Multi-Hop Wireless NetworksB. Lorenzo, University of Oulu S. Glisic, University of Oulu
WSN-8.2 Opportunistic Differential Scheduling in Cellular Multicast ChannelsB. Lorenzo, University of Oulu H. Zhang, University of Oulu S. Glisic, University of Oulu
WSN-8.3 Saturation Throughput of IEEE 802.11 DCF in Multi-Hop Ad-Hoc NetworksPan Li, University of FloridaYuguang Fang, University of Florida
WSN-8.4 Analyzing the Transition Between Unsaturated and Saturated Operating Conditions in 802.11 Network ScenariosJonathan M. Pitts, University of LondonOliver M. Shepherd, University of London
WSN-8.5 A Comparative Study of Anonymous 802.11 ProtocolsYang Qin, Arizona State UniversityYin Yin, Arizona State UniversityDijiang Huang, Arizona State UniversityNirav Shah, Arizona State University
TUESDAY MORNING
MONDAYNovember 17, 2008
WEDNESDAYNovember 19, 2008
TUESDAYNovember 18, 2008
![Page 7: MONDAY TUESDAY WEDNESDAY November 17, 2008 · PDF fileAlgorithms and Protocols ... Huawei Technologies MCS-10.7 A Semiblind Adaptive Beamformer Using a Parallel Pilot Signal for WCDMA](https://reader030.vdocuments.site/reader030/viewer/2022020315/5aadb0b67f8b9aa9488ea56c/html5/thumbnails/7.jpg)
UN
CLA
SSIF
IED
SES
SIO
NS
44
ACT-5 Waveforms and Tactical NetworksRoom 10 2:15 p.m. - 5:00 p.m.This session focuses on waveforms used in tactical networks. The topics of the papers in this session include: underwater acoustic communication, interoperation between military and fi rst responders, UWB Radio, jamming and anti-jamming, as well as waveform/amplifi er design. Discussions will emphasize recent advances in these areas and their effectiveness in solving communications and networking challenges for the military applications.
Session Chair/Organizer: Matthew Kercher, Lincoln Laboratories
ACT-5.1 Long Range Real-Time Underwater Acoustic Communication at Low Bit Rate with Channel Coding ProtectionAndré Goalic, TELECOM Bretagne, FranceNicolas Beuzelin, G.E.S.M.A. BP 42, FranceJoël Trubuil, TELECOM Bretagne, France
ACT-5.2 Reliable Communication Links Between the Military and First RespondersHoward Segal, Lockheed Martin Space SystemsDarcie Pike, Lockheed Martin Space SystemsRobert R. Cleave, Lockheed Martin Space Systems
ACT-5.3 Effects of Jammer and Nonlinear Amplifi ers in MIMO-OFDM with Application to 802.11n WLAN David W. Chi, University of California, San DiegoPankaj Das, University of California, San Diego
ACT-5.4 Waveform and RF Power Amplifi er Interdependencies in Battery-Powered Tactical Radio ApplicationsJohn Nieto, Harris Richard Buckley, Harris William Furman, Harris
ACT-5.5 Conceptual Design of a Dual-Use Radar/Communication System Based on OFDM Dmitriy Garmatyuk, Miami UniversityJonathan Schuerger, Miami University
ACT-5.6 UWB Real-Time Testbed with Waveform-Based PrecodingNan Guo, Tennessee Technological UniversityJohn Q. Zhang, Tennessee Technological University Peng Zhang, Tennessee Technological University Zhen Hu, Tennessee Technological University Yu Song, Tennessee Technological University Robert C. Qiu, Tennessee Technological University
ACT-5.7 Jamming Interference Suppression in Ultra-Wideband Communications Chih-Wei Wang, University of Michigan Wayne E. Stark, University of Michigan
ACT-11 Network Coding: The Current Balance of EvidenceRoom 4 2:15 p.m. - 5:00 p.m.Network coding has emerged as a potentially revolutionary paradigm for information storage and transfer in distributed systems. However, despite recent research and experimentation, the balance of evidence in favor of applied network coding is not yet decisive. On the one hand, there are promising theoretical and practical results that show gains in throughput, delay, robustness, fairness, and information assurance. On the other hand, the extent of potential benefi ts is unclear, especially net of overhead. Papers selected for this session highlight recent analyses and quantitative results that tip the “balance of evidence” to yield a more mature understanding of whether, where, and how to best exploit network coding.
Session Chair: Ananthram Swami, Army Research Lab
Session Organizer: J. Christopher Ramming, Consultant
ACT 11.1 On the Capacity Improvement of Multicast Traffi c with Network CodingZheng Wang, University of California, Santa Cruz Shirish Karande, University of California, Santa CruzHamid R. Sadjadpour, University of California, Santa CruzJ.J. Garcia-Luna-Aceves, Palo Alto Research Center
ACT 11.2 On the Performance of Random Linear Network Coding in Relay NetworksRamin Khalili, University of Massachusetts Majid Ghaderi, University of CalgaryJim Kurose, University of MassachusettsDon Towsley, University of Massachusetts
ACT-11.3 Stable Throughput for Multicast with Inter-Session Network CodingRandy Cogill, University of Virginia Brooke Shrader, University of Maryland Anthony Ephremides, University of Maryland
ACT-11.4 Network Coding vs Erasure Coding: Reliable Multicast in Ad-Hoc NetworksAtsushi Fujimura, NEC Corporation, Japan Soon Y. Oh, University of California, Los Angeles Mario Gerla, University of California, Los Angeles
ACT-11.5 Network Coding Performance: An Emulation ExperimentGregory Lauer, BAE Systems Derek S. Morris, US Army RDECOM, CERDEC
ACT-11.6 Rainbow: A Wireless Medium Access Control Using Network Coding for Multi-Hop Content DistributionChen-Mou Cheng, Harvard University H. T. Kung, Harvard University Chit-Kwan Lin, Harvard University Chia-Yung Su, Harvard University Dario Vlah, Harvard University
ACT-11.7 Network Coding Discussion - No paper
AMS-4 Reliability and PrognosticsRoom 5A 2:15 p.m. - 5:00 p.m.This session covers techniques and approaches associated with reliability and predicting the future condition of a component or system, as well as looking at different approaches for solving Modeling and Simulation questions.
Session Chair: Tom Stayonoff, Raytheon
Session Organizer: Deanna Harden, Raytheon
AMS-4.1 Which One, When? — Prognostics is AchievableTerry Tracy, Raytheon
AMS-4.2 Electronics Prognostics Reference ArchitectureNicholas Almonte, RaytheonDonald Cook, RaytheonJaime Devereaux, RaytheonMark Henry, RaytheonTravis Higgins, RaytheonGregory Roth, Raytheon
AMS-4.3 Communications Solutions for the Prognostics and Health Management ArchitectureAnne-Marie Buibish, RaytheonTim Hughes, RaytheonGuy Schofi eld, RaytheonTom Weber, RaytheonEthan Xu, RaytheonJames L. Lewis, Raytheon
AMS-4.4 Failure Prediction and Diagnosis for Satellite Monitoring Systems Using Bayesian NetworksSteven Bottone, DataPath Daniel Lee, DataPath Michael O’Sullivan, San Diego State UniversityMark Spivack, University of Cambridge
AMS-4.5 Successful Specifi cation Development for Radio Test Systems Dan Pleasant, Agilent Technologies
AMS-4.6 Integration of Proprietary Simulation Engines Using a Software Product Line ApproachChristopher Budny, Textron Defense SystemsKristy Casella, Textron Defense SystemsJeremiah Snader, Textron Defense SystemsSteven Grainger, Textron Systems Corporation
AMS-4.7 New Approach to Modeling of Command and Control Information SystemsMohorko Jože, University of MariborMatjaž Fras, University of MariborŽarko Cucej, University of Maribor
MONDAYNovember 17, 2008
WEDNESDAYNovember 19, 2008
TUESDAYNovember 18, 2008
TUESDAY AFTERNOON
ˇ ˇ
![Page 8: MONDAY TUESDAY WEDNESDAY November 17, 2008 · PDF fileAlgorithms and Protocols ... Huawei Technologies MCS-10.7 A Semiblind Adaptive Beamformer Using a Parallel Pilot Signal for WCDMA](https://reader030.vdocuments.site/reader030/viewer/2022020315/5aadb0b67f8b9aa9488ea56c/html5/thumbnails/8.jpg)
UN
CLA
SSIF
IED
SES
SIO
NS
45
IAS-2 Cognitive Information AssuranceRoom 5B 2:15 p.m. - 5:00 p.m.Intrusion detection systems and anti-virus technologies rely on signatures or models of previous attacks and/or models/benchmarks of normal behaviors to detect attacks or deviations from norms. Real time and offl ine decisions of how to spend system resources both to infer models or signatures and to check for attacks, masquerades or viruses are critical to performance. This session will explore cognitive techniques to learn attack signatures/models and confi gure IDS systems for maximum performance - including detection of zero day attacks. Learning techniques for all areas of Information Assurance systems will be considered with emphasis on computational burden vs. benefi t in dynamic environments.
Session Chair/Organizer: Scott C. Evans, GE
IAS-2.1 A Stochastic Approximation Approach for Improving Intrusion Detection Data Fusion StructuresK. Manousakis, Telcordia TechnologiesD. Sterne, SPARTAN. Ivanic, Army Research LabG. Lawler, SPARTAA. McAuley, Telcordia Technologies
IAS-2.2 Analysis of Wormhole Intrusion Attacks in MANETsViren Mahajan, University of DelawareMaitreya Natu, University of DelawareAdarshpal Sethi, University of Delaware
IAS-2.3 Intrusion Detection of In-Band Wormholes in MANETs Using Advanced Statistical MethodsShanshan Zheng, University of Maryland Tao Jiang, University of Maryland John S. Baras, University of Maryland Anuja Sonalker, SPARTADan Sterne, SPARTARichard Gopaul, US Army Research LaboratoryRommie Hardy, US Army Research Laboratory
IAS-2.4 Honeycyber: Automated Signature Generation for Zero-Day Polymorphic WormsMohssen M. Z. E. Mohammed, University of Cape TownH. Anthony Chan, Huawei TechnologiesNeco Ventura, University of Cape Town
IAS-2.5 A Signature Databasefor Intrusion Detection Systems Targeting Voice-Over Internet Protocol EnvironmentsBazara I. A. Barry, University of Cape TownH. Anthony Chan, Huawei Technologies
IAS-2.6 Network Intrusion Detection: Using MDLCOMPRESS for Deep Packet InspectionE. Earl Eiland, General Electric Global Research Scott C. Evans, General Electric Global Research T. Stephen Markham, General Electric Global Research Bruce Barnett, General Electric Global Research Jeremy Impson, Lockheed MartinEric Steinbrecher, Lockheed Martin
IAS-7 Information Assurance in System Design – IRoom 11A 2:15 p.m. - 5:00 p.m.This session looks at the application of information assurance controls, functions, and techniques that could be used to develop secure systems or system components. The papers consider software assurance, use of device drivers to improve operating system security, the use of standardized interfaces to improve security and interoperability between system components, and key stream generation.
Session Chair/Organizer: Jarret Rush, MITRE
IAS-7.1 Coding Standards for High-Confi dence Embedded SystemsPaul Anderson, GrammaTech
IAS-7.2 Improving Software Reliability and Security with Automated AnalysisPaul Anderson, GrammaTech
IAS-7.3 Device Drivers in Time and Space Partitioned Operating SystemsJames F. Mason, BoeingKenn R. Luecke, BoeingJahn A. Luke, Air Force Research Laboratory
IAS-7.4 High Assurance Cryptographic InterfaceDaniel J. Lanz, MITRE
IAS-7.5 Global Virtual Vault: Preventing Unauthorized Physical Disclosure by the InsiderMike Fisk, Los Alamos National LaboratoryScott Miller, Los Alamos National LaboratoryAlex Kent, Los Alamos National Laboratory
IAS-7.6 A Novel Modifi ed True Random Binary Number Generator for Key Stream Generation in Cryptographic ApplicationsMarta Blaszczyk, Cork Institute of TechnologyRichard A. Guinee, Cork Institute of Technology
IAS-7.7 Applying Network Address Encryption to Anonymity and Preventing Data Exfi ltration Johnathan Trostle, Johns Hopkins University/APL
MCS-2 LDPC, Iterative and Other Coding Techniques – IRoom 14B 2:15 p.m. - 5:00 p.m.Low Density Parity Check (LDPC), iterative and other error-correction coding techniques are a key element in modern communication systems. The papers in this session discuss these important error-correction strategies.
Session Chair: Jim Norris, Harris
Session Organizer: John W. Nieto, Harris
MCS-2.1 Bounded Angle Iterative Decoding of LDPC CodesSam Dolinar, Jet Propulsion LaboratoryKenneth Andrews, Jet Propulsion LaboratoryFabrizio Pollara, Jet Propulsion LaboratoryDariush Divsalar, Jet Propulsion Laboratory
MCS-2.2 Adaptive-Rate Nonbinary LDPC Coding for Frequency-Hop Communications Michael B. Pursley, Clemson UniversityThomas C. Royster IV, Clemson University
MCS-2.3 Serially Concatenated Codes for Aeronautical Telemetry Kanagaraj Damodaran, University of KansasErik Perrins, University of Kansas
MCS-2.4 Error Floor Analysis for an Ensemble of Easily Implementable Irregular (2048, 1024) LDPC Codes Chad Cole, Syracuse Research Corp
MCS-2.5 The Performance of Flexible LDPC Codes on Gaussian Channels with Bursty Erasures Thomas R. Halford, TrellisWare Technologies Cenk Kose, TrellisWare Technologies
MCS-2.6 Effi cient Quantization Schemes for LDPC Decoders Radivoje Zarubica, University of VirginiaRyan Hinton, University of VirginiaStephen G. Wilson, University of VirginiaEric K. Hall, L-3 Communications
MCS-2.7 Performance Tradeoffs Under Delay Constraints on Iterative Decoding of LDPC CodesJaWone Kennedy, Clemson UniversityDaniel L. Noneaker, Clemson University
MONDAYNovember 17, 2008
WEDNESDAYNovember 19, 2008
TUESDAYNovember 18, 2008
TUESDAY AFTERNOON
![Page 9: MONDAY TUESDAY WEDNESDAY November 17, 2008 · PDF fileAlgorithms and Protocols ... Huawei Technologies MCS-10.7 A Semiblind Adaptive Beamformer Using a Parallel Pilot Signal for WCDMA](https://reader030.vdocuments.site/reader030/viewer/2022020315/5aadb0b67f8b9aa9488ea56c/html5/thumbnails/9.jpg)
UN
CLA
SSIF
IED
SES
SIO
NS
46
MCS-11 Application of Signal Processing to EstimationRoom 16A 2:15 p.m. - 5:00 p.m.This Session provides the latest research in channel estimation including techniques for handling multipath and the mobile environment.
Session Chair/Organizer: Fred Harris, San Diego State University
MCS-11.1 Scalar Quantizers for Decentralized Estimation of Multiple Random SourcesAzadeh Vosoughi, University of RochesterRen Gang, University of Rochester
MCS-11.2 Channel Estimation and Equalization for CE-OFDM in Multipath Fading Channels Ahsen Ahmed, SPAWAR Systems Center, San DiegoSteve C. Thompson, Acorn TechnologiesJames R. Zeidler, University of California, San Diego
MCS-11.3 Low PAPR Preamble for Improved Channel Estimation Christopher D. Moffatt, Harris John Hoffmann, Harris
MCS-11.4 Channel Estimation with Wavelet De-noising for OFDM System in Mobile Environment Dong Heon Lee, Pusan National UniversitySuk Chan Kim, Pusan National UniversityJin Woo Park, Pusan National UniversitySeong Lai Park, Pusan National University
MCS-11.5 Blind Separation of Weak Signals in Non-Isotropic Spatio-Temporal Colored Noise with Possibly Critically Loaded Uncalibrated Arrays Edward R. Beadle, HarrisJohn F. Dishman, Harris
MCS-11.6 Estimation of Sparse Multipath Channels Matthew Sharp, Cornell UniversityAnna Scaglione, University of California, Davis
MCS-11.7 Joint Detection and Direction-of-Arrival Estimation Using Bayesian Method Da Xie, New Jersey Institute of TechnologyJianguo Huang, Northwestern Polytechnical UniversityTingting Niu, Northwestern Polytechnical UniversityHongya Ge, New Jersey Institute of Technology
MCS-13 LDPC, Iterative and Other Coding Techniques - IIIRoom 15A 2:15 p.m. - 5:00 p.m.Low Density Parity Check (LDPC), iterative and other error-correction coding techniques are a key element in modern communication systems. The papers in this session discuss these important error-correction strategies.
Session Chair: Howard Waldman, Raytheon
Session Organizer: John W. Nieto, Harris
MCS-13.1 Spectral Effi ciency Maximization Using Pragmatic Modern Rate-Compatible Code FamiliesThomas R. Halford, TrellisWare TechnologiesCenk Kose, TrellisWare Technologies
MCS-13.2 Reed Solomon Coded M-ary Hyper Phase-Shift Keying James Caldwell, Naval Postgraduate SchoolClark Robertson, Naval Postgraduate School
MCS-13.3 Reduced-Complexity Woven Serial Concatenated TCM for Tactical OFDM Communications Hugo M. Tullberg, Swedish Defence Research Agency
MCS-13.4 Oscillator Mismatch and Jitter Compensation in Concurrent Codecs William L. Bahn, United States Air Force AcademyLeemon C. Baird III, United States Air Force AcademyMichael D. Collins, Department of Defense
MCS-13.5 Comparing List Viterbi Algorithms With and Without Tail Bits Maruf Mohammad, Hughes Network SystemsJe-Hong Jong, Hughes Network SystemsHarish Ramchandran, Hughes Network SystemsCharles Barnett, Hughes Network Systems
NCS-1 Airborne Communications and Networking in Net-Centric EnvironmentRoom 6E 2:15 p.m. - 5:00 p.m.In this session we present new theory and practice relative to networking in general and specifi cally airborne networking. There will be discussions of theoretical approaches to quantifying the performance of MANETs and Random Access Networks. In the discipline known as Information Theory, there is the concept of presenting information transport capability via the metric known as Entropy. It will be shown how to apply Entropy to MANETs and a method for Link Scheduling to Maximize End- to-End Throughput with a Fairness Discipline in TDMA Networks will be presented. A paper presenting the results of a survey to identify the current capabilities available to
address MANET performance within the context of accounting for spectrum-related issues and to describe two capabilities that were developed to help bridge the gap in the area relating spectrum requirements to system performance predictions is included. This is relevant to emerging networking waveforms (e.g., WNW, SRW, TTNT, FAST, etc.). Also included is a paper on a unique method for mobility aware routing in an airborne network using the Air Force’s backbone approach. Most importantly, a paper will be presented giving examples and results from recent Air Force airborne networking experiments and exercises.
Session Chair/Organizer: Kenneth Brayer, MITRE
NCS-1.1 The Generalization of Information Entropy to MANET MetricsCarmen Cerasoli, MITRE James Dimarogonas, MITRE
NCS-1.2 Link Scheduling to Maximize End-to-End Throughput with Fairness Discipline in TDMA NetworksDouglas Hulbert, SPAWAR Systems Center-Pacifi c
NCS-1.3 Quantifying Network Performance of Mobile Ad-Hoc NetworksG. Comparetto, MITREJ. Marshall, MITREM. Mirhakkak, MITREN. Schult, MITRE J. Schwartz, MITREK. Zhang, MITRED. DiOrio, Joint Spectrum CenterS. Thai, Joint Spectrum Center
NCS-1.4 Mobility Aware Routing for the Airborne Network BackboneAbhishek Tiwari, UtopiaCompression Anurag Ganguli, UtopiaCompression Ashwin Sampath, UtopiaCompression D. Scott Anderson, UtopiaCompression Bao-hong Shen, UtopiaCompression Niyant Krishnamurthi, UtopiaCompression Joseph Yadegar, Utopia Compression Mario Gerla , University of California, Los Angeles David Krzysiak, Air Force Research Lab/RIGC
NCS-1.5 A Practical Guide to Modern Airborne NetworkingSamuel Wiebenson, MITRE
NCS-1.6 Simple, Optimal, and Robust Random AccessA. Hamed Mohsenian-Rad, University of British ColumbiaJianwei Huang, Chinese University of Hong KongMung Chiang, Princeton University Vincent W.S. Wong, University of British Columbia
MONDAYNovember 17, 2008
WEDNESDAYNovember 19, 2008
TUESDAYNovember 18, 2008
TUESDAY AFTERNOON
![Page 10: MONDAY TUESDAY WEDNESDAY November 17, 2008 · PDF fileAlgorithms and Protocols ... Huawei Technologies MCS-10.7 A Semiblind Adaptive Beamformer Using a Parallel Pilot Signal for WCDMA](https://reader030.vdocuments.site/reader030/viewer/2022020315/5aadb0b67f8b9aa9488ea56c/html5/thumbnails/10.jpg)
UN
CLA
SSIF
IED
SES
SIO
NS
47
NCS-4 Next Generation Warfighter Networks and SystemsRoom 6F 2:15 p.m. - 5:00 p.m.The Next Generation Warfi ghter Networks and Systems session looks into the future and examines concepts and early stages of technologies and how they can support our warfi ghter. Technologies such as wireless in bandwidth limited environments, Information Assurance in an NCES environment and optimized network routing protocols. The goal of the session is to provide the community with a cross section of the most promising approaches and technologies to enable military systems and to provide a forum for continued communication on warfi ghter needs.Session Chair/Organizer: Robert Cole, Johns Hopkins University/APL
NCS-4.1 Enhanced IP Multimedia Subsystem (IMS) for Futuristic Tactical Networks Harold Zheng, Johns Hopkins University/APLSherry Wang, Johns Hopkins University/APL
NCS-4.2 IA Consideration of Assured Services in a Transformational Network Centric EnvironmentDeborah Farroha, DoDBassam Farroha, Northrop Grumman Corporation
NCS-4.3 A Technology Study on Tactical Naming Service for Mounted and Dismounted Segments Xinyu Lu, General Dynamics Canada Mark Li, General Dynamics Canada
NCS-4.4 IEEE 802.21 Optimized Handover Delay for Proxy Mobile IPv6 Linoh Magagula, University of Cape Town H. Anthony Chan, Huawei Technologies
NCS-4.5 Effi cient Routing for Correlated Data in Wireless Sensor Networks Engin Zeydan, Stevens Institute of Technology Didem Kivanc, Stevens Institute of Technology Cristina Comaniciu, Stevens Institute of Technology
NCS-4.6 Situational Awareness with Real Time IP Applications over Next Generation Packet Processing Satellites Rajeev Gopal, Hughes Network SystemsSteve Arnold, Hughes Network SystemsSridhar Chandrasekharan, Hughes Network Systems
NCS-4.7 Epidemic Routing with Immunity in Delay-Tolerant Networks Padma Mundur, University of Maryland Matthew Seligman, Laboratory for Telecommunications Sciences Ginnah Lee, University of Maryland
NCS-5 IP Converged Integrated GIG Services for the WarfighterRoom 11B 2:15 p.n. - 5:00 p.m.This session addresses the various aspects and challenges for the development of an All-IP integrated end-to-end GIG architecture to achieve DoD’s vision of network-centric operations. The papers presented in this session cover broad spectrum of topics ranging from network traffi c characterization for multi-channel wireless networks, Disruption-Tolerant Networking technology, routing and resource/performance management and Navy’s overall strategy for transitioning its critical network infrastructure to IPv6 across the DISN/GIG.
Session Chair/Organizer: Syed A. Shah, DoD/DISA
NCS-5.1 Persistent Delivery with Deferred Binding to Descriptively Named DestinationsPrithwish Basu, BBN TechnologiesRajesh Krishnan, IEEEDaniel W. Brown, BBN Technologies
NCS-5.2 Planning and Learning Algorithms for Routing in Disruption-Tolerant NetworksMark-Oliver Stehr, SRI InternationalCarolyn Talcott, SRI International
NCS-5.3 Performance Evaluation of Information Retrieval Schemes for Multi-Attribute Queries in DTNsM. Chuah, Lehigh UniversityJ. Han, Lehigh University
NCS-5.4 Time-Based Sampling Strategies for Multi-Channel Wireless Traffi c Characterization in Tactical Cognitive NetworksBheemarjuna Reddy Tamma, University of California, San Diego B.S. Manoj, University of California, San Diego Ramesh R Rao, University of California, San Diego
NCS-5.5 A New Addressing Solution for Scalable Routing in the Presence of MobilityLotfi Benmohamed, Johns Hopkins University/APL Robert Cole, Johns Hopkins University/APL Bharat Doshi, Johns Hopkins University/APL
NCS-5.6 Available User Information Rate Capacities in Battlespace Network Centric Sensor OperationsJerry Brand, Harris Robert Bach, Harris
NCS-5.7 Navy Internet Protocol Version 6 (IPv6) Transition Strategy in Support of Network Centric Operations and WarfarePhuong Nguyen, SPAWAR Systems Center Pacifi c Robert Ferro, SPAWAR Systems Center Pacifi c Anh Nguyen, SPAWAR Systems Center Pacifi c Steven Lam, SPAWAR Systems Center Pacifi c Tuan Nguyen, SPAWAR Systems Center Pacifi c Timothy Ho, SPAWAR Systems Center Pacifi c Roger Ogden, SPAWAR Systems Center Pacifi c Daniel Greene, SPAWAR Systems Center Pacifi c Mark Stell, SPAWAR Systems Center Pacifi c Cam Tran, SPAWAR Systems Center Pacifi c Albert K. Legaspi, SPAWAR Systems Center Pacifi c
RST-3 Cognitive Radio - Spectrum Access – IRoom 3 2:15 p.m. - 5:00 p.m.Cognitive Radio technology is an enabler for enhancing and extending radio capabilities and performance. A signifi cant focus area has been dynamic spectrum access. For example, the DAPRA NeXt Generation (XG) program and IEEE SCSA41 working groups have focused on the opportunistic usage of spectrum white space. Recent work has begun to take this technology beyond simple RF sensing and has begun to consider cooperative spectrum planning, patterns of spectrum usage, and methods for rapid spectral assessment. This session presents new and innovative approaches to spectrum sensing, assessment and dynamic access.
Session Chair/Organizer: Vincent Kovarik, Harris
RST-3.1 Clustering Methods for Distributed Spectrum Sensing in Cognitive Radio SystemsAmy C. Malady, Virginia Polytechnic Institute Claudio R. C. M. da Silva, Virginia Polytechnic Institute
RST-3.2 Spectrum Sensing Using Bussgang Theorem for IEEE 802.22 WRANSung Soo Hwang, Pusan National UniversityDong Chan Park, Pusan National UniversitySuk Chan Kim, Pusan National UniversityMyung Sun Song, Electronics and Telecommunications Research InstituteSun Min Lim, Electronics and Telecommunications Research Institute
RST-3.3 Performance Study of a Novel Selective Cooperative Spectrum Sensing Scheme for Secondary RadiosHaifeng Yuan, Institute for Infocomm Research; National University of SingaporeYong Huat Chew, National University of SingaporeSadasivan Puthusserypady, Institute for Infocomm Research
MONDAYNovember 17, 2008
WEDNESDAYNovember 19, 2008
TUESDAYNovember 18, 2008
TUESDAY AFTERNOON
![Page 11: MONDAY TUESDAY WEDNESDAY November 17, 2008 · PDF fileAlgorithms and Protocols ... Huawei Technologies MCS-10.7 A Semiblind Adaptive Beamformer Using a Parallel Pilot Signal for WCDMA](https://reader030.vdocuments.site/reader030/viewer/2022020315/5aadb0b67f8b9aa9488ea56c/html5/thumbnails/11.jpg)
UN
CLA
SSIF
IED
SES
SIO
NS
48
RST-3.4 Optimal Spectrum Planning and Management with Coalition Joint Spectrum Management Planning Tool (CJSMPT)Randy Poe, Lockheed Martin Harris Zebrowitz, Lockheed Martin William Kline, Lockheed Martin Raymond Shaw, Lockheed MartinWilliam Heisey, Lockheed MartinFrank Loso, US Army Communications Electronics Research Development and Engineering CenterYoram Levy, US Army Communications Electronics Research Development and Engineering Center
RST-3.5 When to Quit for a New Job: Quickest Detection of Spectrum Opportunities in Multiple ChannelsQing Zhao, University of California, DavisJia Ye, University of California, Davis
RST-3.6 Diversity Techniques for Spectrum Sensing in Fading EnvironmentsMort Naraghi-Pour, Louisiana State UniversityTakeshi Ikuma, Louisiana State University
RST-6 Radio Systems and TechnologiesRoom 9 2:15 p.m. - 5:00 p.m.This session covers a variety of interesting state-of-the-art topics in military communications. It includes a paper discussing a novel superconductor A/D converter. Another paper describes the design of a secure data multiplexer. The session contains three papers related to RF. One paper discusses the design of a monolithic RF phased array VCO network and another describes use of COTS radios with multi-sector directional antennas. The last paper describes predistortion linearization techniques for a RF power amplifi er.
Session Chair/Organizer: Timothy S. Loos, Raytheon
RST-6.1 Superconductor Analog to Digital Converter for SIGINT ApplicationsAmol Inamdar, HYPRESDeepnarayan Gupta, HYPRESTimur Filippov, HYPRESIgor Vernik, HYPRESAndrei Talalaevski, HYPRESAnubhav Sahu, HYPRESSaad Sarwana, HYPRESAnna Leese de Escobar, SPAWAR Systems CenterDeborah Van Vechten, Offi ce of Naval Research
RST-6.2 High Assurance Multiplexer Techniques for use with Secure Digital CommunicationsDuncan Harris, HarrisJohn Fitton, Harris Christopher D. Mackey, Harris
RST-6.3 A Novel Tuning Technique for RF Phase Arrays Using Fully-Integrated Monolithic AC-Coupled 1-D VCO NetworkJ. Lopez, Texas Tech UniversityD.Y.C. Lie, Texas Tech UniversityJ. Cothern, SPAWAR Systems CenterJ. Neff, SPAWAR Systems CenterB.K. Meadow, SPAWAR Systems Center
RST-6.4 Network Solutions for Employing COTS Radios in Multi-Sector Directional ArchitecturesChristopher Cirullo, SPAWAR Systems CenterRandall Olsen, SPAWAR Systems CenterChristopher Meagher, SPAWAR Systems CenterRobert C. Ferro, SPAWAR Systems CenterPatrick Crescini, SPAWAR Systems CenterLarry Majure, SPAWAR Systems Center
RST-6.5 Linearization of EER RF Power Amplifi ers Using an Adaptive Subband PredistorterChristopher Moffatt, Harris James Tonti, Harris
SAC-8 IP SATCOM, DVB-RCS, WGS and PropagationRoom 15B 2:15 p.m. - 5:00 p.m.This session covers papers addressing proposed DISN Satellite Services (DSS), end user terminal components capability and advantages to the deployed warfi ghter, unifi ed remote IP SATCOM monitoring and management system and Wideband Global SATCOM (WGS)-1 On-Orbit Terminal Interoperability Demonstration (OOTID) results. Following these, also included are relevant topics related to DVB augmentation issues for MILSATCOM and secure transport services over DVB-RCS Satellite system using XCP. A propagation predictive tool to estimate SATCOM link attenuation and refractive effects is also included.
Session Chair/Organizer: Sastri L. Kota, Harris
SAC-8.1 Defense Information System Network Satellite Service Bruce Bennett, Defense Information Systems Agency Christopher Meyer, Booz Allen HamiltonJithin Raghunath, Booz Allen Hamilton
SAC-8.2 Remote IP SATCOM Monitoring and ManagementBruce Bennett, Defense Information Systems Agency Shane Transue, Booz Allen Hamilton
SAC-8.3 Provisioning Tactical MILSATCOM through DVB Augmentation Taj A Sturman, Astrium LimitedPeter Dingley, Astrium LimitedMark D.J. Bowyer, Astrium LimitedNeil R. Petfi eld, Astrium LimitedMartin Moseley, Astrium LimitedGodred Fairhurst, University of Aberdeen
SAC- 8.4 Supporting Reliable and Secure Transport Services Over DVB-RCS Satellite Systems Using XCPLiangping Ma, Argon STBo Ryu, Argon STDavid Tang, Argon ST
SAC-8.5 OFDM Modulation Schemes for Military Satellite CommunicationsLudong Wang, Booz Allen Hamilton, Inc.Brian Jezek, MILSATCOM JTEO
SAC-8.6 A New Propagation Prediction Tool for Earth-Space Geometries for the Advanced Refractive Effects Prediction System (AREPS)Richard A.Sprague, SPAWAR Systems CenterPriya Babu, SPAWAR Systems Center
WMC-2 Multiple Antenna Systems - IIRoom 2 2:15 p.m. - 5:00 p.m.This session focuses on the implementation and analysis of multiple antenna communication systems, especially those confi gured for MIMO operations.
Session Chair: Feng Ouyang, John Hopkins University/APL
Session Organizers: Huaping Liu, Oregon State UniversitySteve Davidson, Raytheon
WMC-2.1 Reduced Complexity Two-Stage Approximate Sorting Fixed Complexity Sphere Decoder with Real-Valued Lattice Formulation for MIMO SystemKelvin Lee, University of California, Los AngelesBabak Daneshrad, University of California, Los Angeles
WMC-2.2 Narrowband Jammer Resistance for MIMO OFDMAnish Shah, Silvus TechnologiesBabak Daneshrad, Silvus TechnologiesWeijun Zhu, Silvus Technologies
WMC-2.3 Dual Codebook Antenna Method for Spatial Multiplexing MIMO SystemsBertan Tezcan, USCKeith M. Chugg, USC
WMC-2.4 A Lattice Precoding Scheme for Flat-Fading MIMO ChannelsJin He, Northeastern UniversityMasoud Salehi, Northeastern University
WMC-2.5 Cutoff Rate of MIMO Systems in Rayleigh Fading Channels withPSK Signaling Paul Ho, Simon Fraser UniversityKar-Peo Yar, Institute for Infocomm ResearchPooi Yuen Kam, National University of Singapore
TUESDAY AFTERNOON
MONDAYNovember 17, 2008
WEDNESDAYNovember 19, 2008
TUESDAYNovember 18, 2008
![Page 12: MONDAY TUESDAY WEDNESDAY November 17, 2008 · PDF fileAlgorithms and Protocols ... Huawei Technologies MCS-10.7 A Semiblind Adaptive Beamformer Using a Parallel Pilot Signal for WCDMA](https://reader030.vdocuments.site/reader030/viewer/2022020315/5aadb0b67f8b9aa9488ea56c/html5/thumbnails/12.jpg)
UN
CLA
SSIF
IED
SES
SIO
NS
49
WMC-2.6 Performance of M-QAM Multiple Antenna Systems at 60GHzPreeti Nagvanshi, University of California, San DiegoElias Masry, University of California, San DiegoLaurence Milstein, University of California, San Diego
WMC-2.7 Minimal Complexity Blind Interference Mitigation via Non-Eigen Decomposition BeamformingGarret Okamoto, Adaptive Communications ResearchChih-Wei Chen, Adaptive Communications Research
WSN-4 Heterogeneous Tactical Edge NetworkingRoom 6C 2:15 p.m. - 5:00 p.m.The employment of IP networking at the tactical edge is challenging because most commercial IP networks are static and operate over very high bandwidth links. At the tactical edge, network nodes often move and the bandwidth of the links is very limited. Mobile ad-hoc networking (MANET) protocols are designed to handle these wireless environments. Each edge waveform employs a MANET protocol tuned to its peculiar environment. These protocols interact with the IP layers in the radios to hide the network mobility and dynamics from the external commercial-based networking equipment to facilitate interoperability. This session will present various techniques that can be used for effi cient networking at the tactical edge across heterogeneous waveforms.
Session Chair/Organizer: Gary Pei, Boeing
WSN-4.1 Performance of a Seamless Soft Handoff Protocol for Tactical Mobile Ad-Hoc NetworksZhensheng Zhang, Argon STDavid Tang, Argon STIbrahim Hokelek, TelcordiaAristides Staikos, US ArmyJeffery Bowcock, US Army
WSN-4.2 On Providing Seamless Handoff in Ad-Hoc Networks with Wireless Heterogeneity Jason H. Li, Intelligent Automation Song Luo, Intelligent Automation Tuna Guven, Intelligent Automation Yi Cheng, Intelligent Automation Subir Das, Telcordia TechnologiesAnthony McAuley, Telcordia TechnologiesJoe Sherrick, Army CERDECChristine Adelfi o, Army CERDECAristides Staikos, Army CERDECSeth Spoenlein, Army CERDECMario Gerla, UCLA
WSN-4.3 HAIPE Compliant TCP Performance Enhancing Proxy for Bandwidth-On-Demand EnvironmentDell Kronewitter, Argon STBo Ryu, ArgonSTZhensheng Zhang, ArgonSTLiangping MA, ArgonST
WSN-4.4 Aerial Platform Placement Algorithms to Satisfy Connectivity, Capacity and Survivability Constraints in Wireless Ad-hoc NetworksDavid Yee, US Army RDECOM - CERDECCharles Graff, US Army RDECOM - CERDECJohn Baras, AIMSSenni Perumal, AIMS
WSN-4.5 Reliability Enhancement for SIP Signaling in Tactical EnvironmentsHarold Zheng, Johns Hopkins University /APLSherry Wang, Johns Hopkins University /APL
WSN-4.6 An Effi cient Routing Protocol to Increase the Communication Reliability of Multi-Hop Cellular NetworksZe Li, University of ArkansasHaiying Shen, University of Arkansas
WSN-4.7 Predictive Handover Mechanism Based on Required Time Estimation in Heterogeneous Wireless NetworksSang-Jo Yoo, Inha UniversityDavid Cypher, NISTNada Golmie, NIST
WSN-10 Sensor Networks – Tracking and LocalizationRoom 6D 2:15 p.m. - 5:00 p.m.Wireless sensor networking is a topic that has continued to receive signifi cant research and development interest over the past decade. This session considers the topic of wireless sensor networking, with a particular emphasis on the topics of node localization, distributed detection and target tracking in wireless sensor networks. These topics are both extremely important as the military aims and commercial domains to achieve potentially very large and complex sensor network applications.
Session Chair/Organizer: Hongyang Chen, University of Tokyo
WSN-10.1 Tiered Architecture for On-line Detection, Isolation, and Repair of Faults in Wireless Sensor Networks Sadaf Zahedi, University of California, Los AngelesMarcin Szczodrak, City University of New YorkPing Ji, City University of New YorkDinkar Mylaraswamy, HoneywellMani Srivastava, University of California, Los AngelesRobert Young, MoD, United Kingdom
WSN-10.2 Localizing Sensor Networks in Un-Friendly Environments Sriram Chellappan, Missouri University of Science and TechnologyVamsi Paruchuri, University of Central ArkansasDylan McDonald, Missouri University of Science and TechnologyArjan Durresi, Indiana University Purdue University
WSN-10.3 Balancing Cost-Quality Tradeoff in Cooperative Ad-Hoc Sensor NetworksEyuphan Bulut, Rensselaer Polytechnic InstituteJin Zheng, Rensselaer Polytechnic InstituteZijian Wang, Rensselaer Polytechnic InstituteBoleslaw K. Szymanski, Rensselaer Polytechnic Institute
WSN-10.4 Optimal Sensor Deployment for Distributed Detection in the Presence of Channel FadingThakshila Wimalajeewa, University of New MexicoSudharman K. Jayaweera, University of New Mexico
WSN-10.5 Mobility-Assisted Cooperative Localization Scheme for Wireless Sensor Networks Hongyang Chen, University of Tokyo Pei Huang, Michigan State UniversityHing Cheung So, City University of Hong KongXi Luo, Southwest Jiaotong UniversityPing Deng, Southwest Jiaotong University
TUESDAY AFTERNOON
MONDAYNovember 17, 2008
WEDNESDAYNovember 19, 2008
TUESDAYNovember 18, 2008