Radiated Emissions from Proximity Coupled Oversized Heat-Sinks

  • Moongilan D.

Radiated emission characteristics of oversized heat sinks that have surface area substantially larger than the top contact surface of the IC package are investigated. The heat sinks are found to radiate higher levels at the frequencies that are present in the proximity of the heat sink than the frequencies contained ...

Understanding Dynamic Spectrum Access: Models, Taxonomy and Challenges

  • Buddhikot M.

In the last few years, especially after release of the FCC Spectrum Policy Task Force (SPTF)'s seminal report in 2002, we have witnessed growing interest in the field of Dynamic Spectrum Access (DSA) networks. Terms such as reconfigurable networks, Software Defined Radios (SDRs), Cognitive Radios and Cognitive Radio Networks (CRNs) ...

Service Blending for Converged IMS Services: A BT Alcatel-Lucent Collaboration

  • Kocan K.
  • Matthews J.
  • V.S. Abhayawardhana

British Telecom (BT) has set off on a 10-year journey to completely overhaul its core network that would ultimately cost them 10 billion pounds sterling. The core network will be called BT 21st Century Network (21CN). This endeavour is justified mainly on two counts; it will make BT significant cost ...

DESH: Overhead Reduction Algorithms for Deferrable Scheduling

  • D. Chen
  • K.-Y. Lam
  • S. Han
  • Xiong M.

The deferrable scheduling algorithm for fixed priority transactions (DS-FP) is demonstrated to be a very effective approach for minimizing real-time update transaction workload while maintaining temporal vailidity of real-time data. While its on-line scheduling overhead is a concern, in this paper, we propose two hyperperiod based DS-FP approaches satisfying the ...

A Hierarchical Model for Prescribing EMC Design Targets to the Components of a System

  • Kudyan H.

Components of a System (i.e., Units, Shelves, or Modules) cannot meaningfully be tested for system-level emissions compliance by themselves. The lack of EMC Design objectives for emissions at the sub-system level makes it ambiguous for component designers to decide whether a given component design is EMC-sufficient. The purpose of the ...

Model Centric Development of Highly Available Software Systems

  • Gonzalez O.
  • R. Buskens

In today's rapidly evolving marketplace, the ability to quickly build and deploy new systems is an increasingly critical factor in a company's success. For certain domains, such as telecommunications, it is taken for granted that systems will be highly available, with expectations of "5 9s" or even higher availability, translating ...

Effects of User-Deployed, Co-Channel Hierarchical Cells on the Call Drop Probability in a Residential Scenario

  • Claussen H.
  • Ho L.

This paper analyses the effects of low-power, co-channel hierarchiac UMTS femtocells deployed by users in their homes on the dropped called resulting from additional handovers. These residential femtocell base stations would be deployed without much consideration to cell planning on the part of the user, relying instead on inbuilt auto-configuration ...

Traffic-Oblivious Network Routing for Guaranteed Network Performance

  • Kodialam M.
  • Lakshman T.
  • Sengupta S.

We describe a capacity efficient, robust, and traffic-oblivious routing strategy, called two-phase routing, that allows pre-configuration of the VPN such that all traffic patterns permissible within the network's natural ingress-egress capacity constraints can be routed with bandwidth guarantees. The scheme routes traffic in two phases - traffic entering the VPN ...

Performance and Capacity of Cellular OFDMA Systems with Voice over IP Traffic

  • Bi Q.
  • Vitebsky S.
  • Yang Y.
  • Yuan Y.
  • Zhang Q.

We propose a methdology to evaluate the VoIP capacity and performance of OFDMA based systems. The approach combines the queueing and the interference analyses to find the delay and power outage. Using this analytical framework, we provide an insight into tradeoffs among capacity limiting factors including channel dimensions, power, interference ...

Fast Handover Scheme for Real-Time Applications in Mobile WiMAX

  • Jiang P.
  • Jiao W.
  • Ma Y.

IEEE 802.16 WirelessMAN, which aims to provide broadband wireless access, has evolved to 4G mobile communication systems, which are defined in IEEE 802.16e standards to support mobility on existing fixed Wireless MAN systems. IEEE 802.16e (Mobile WiMAX) achieves high-speed wireless data and telephony transmission by employing high quality broadband wireless ...

Assessing and Managing Portfolio Risk

  • Klein R.

The importance of Portfolio Management is discussed, outlining the key elements of risk assessment and management within the context of product portfolio management by extending the standard investment portfolio management framework and answering the following questions: How to tie Risk Assessments to Portfolio Prioritization? Risk vs. Reward or Return, Balance, ...

Oxide electronics emerge

  • Ramirez A.

Most condensed matter physics can be considered either basic research of complex (or emergent) phenomena in large numbers (10 sup 22) of particles, or the development of new marerials for technological applications. When these paths intersect in a single experiment, one feels that the future comes a little better into ...

Load Balancing in the Internet with Strict Delay Constraints

  • Andrews D.

We study the problem of routing traffic in the Internet with strict delay constraints. This problem arises in the context of routing delay-sensitive traffic such as Voice-over-IP. We consider a set of demands that can be routed along a candidate set of paths. Each demand must be split among its ...

The Application of Negative Permittivity Materials and Metamaterials in Electrically Small Antennas

  • Stuart H.

This paper presents an overview of research at Bell Laboratories on the use of negative permittivity in electrically small antennnas. This work began with a simple theoretical question: if we had a material with negative electric permittivity at microwave frequencies, could we use this material to construct a high performance ...

Anonymous Tracking Using RFID Tags

  • Kodialam M.
  • Nandagopal T.
  • W.C. Lau

The increasing use of RFID tags in many applications have brought forth valid concerns of privacy and anonymity among users. One of the primary concerns with RFID tags is their ability to track an individually tagged entity. While this capability is currently thought to be necessary for supporting some features ...

Converging Communications as Fuel for the Business Improvement Engine

  • Aarle S.

In his keynote address, "10 Rules for Strategic Innovators," Vijay Govindarajan stressed the need for C-level executives to spend less time managing the present and more time focused on creating their company's future. One of his funadmental points was that sustainable innovation often requires companies to break with their traditional ...

Negative Refraction in Mid-Infrared Semiconductor Metamaterials

  • A.J. Hoffman
  • C. Gmachl
  • E.E. Narimanov
  • L. Alekseyev
  • Sivco D.

Semiconductor metamaterials consisting of n+-GaInAs/i-AlInAs heterostructures that support negative index modes in the mid-infrared are reported. We demonstrate negative refraction in these metamaterials for wavelengths from 9-15 mum over a wide range of incidence angles.

Open Pluggable Edge Services: An Architecture for Networked Content Services

  • Hofmann M.
  • L.R. Beaumont

The IETF's Open Pluggable Edge Services (OPES) working group focuses on rule-based, in-line transformation services of data flows between two internet endpoints, such as Web servers and Web clients. The group has developed an architectural framework to authorize, invoke, and trace such application-level services. The framework follows a one-party consent ...

On the Detection of Signaling DoS Attacks on 3G Wireless Networks

  • Bu T.
  • P. Lee

Third Generation (3G) wireless networks based on the CDMA2000 and UMTS standards are now increasingly being deployed throughout the world. Because of their complex signaling and relatively limited bandwdith, these 3G networks are generally more vulnerable than their wireline counterparts, thus making them fertile ground for new attacks. In this ...

Multicast Scheduling in Cellular Data Networks

  • D.Y. Eun
  • Guo K.
  • H. Cai
  • H. Won
  • I. Rhee
  • Netravali A.
  • Sabnani K.

Applications that benefit from multicast are now being deployed over 3G wireless data networks. Multicast scheduling in this context is challenging: there is no endpoint feedback mechanism, and the default schemes transmit data at a fixed rate assuming there is always a user at the edge of the cell. This ...