2011
Authors
Sousa, R; Ferreira, A;
Publication
12TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION 2011 (INTERSPEECH 2011), VOLS 1-5
Abstract
In this paper we introduce new phase-related features denoting the delay between the harmonics and the fundamental frequency of a periodic signal, notably of voiced singing. These features are identified as Normalized Relative Delay (NRD) and denote the phase contribution to the shape invariance of a periodic signal. Thus, NRDs are amenable to a physical and psychophysical interpretation and are structurally independent of the overall time shift of the signal, an important property that is shared with the magnitude spectrum in the case of a locally stationary signal. We describe the NRD and report on preliminary studies testing the discrimination capability of NRDs applied to singing signals.
2011
Authors
Carneiro, G; Fontes, H; Ricardo, M;
Publication
SIMULATION MODELLING PRACTICE AND THEORY
Abstract
In the networking research and development field, one recurring problem faced is the duplication of effort to write first simulation and then implementation code. We posit an alternative development process that takes advantage of the built in network emulation features of Network Simulator 3 (ns-3) and allows developers to share most code between simulation and implementation of a protocol. Tests show that ns-3 can handle a data plane processing large packets, but has difficulties with small packets. When using ns-3 for implementing the control plane of a protocol, we found that ns-3 can even outperform a dedicated implementation.
2011
Authors
Pinto, A; Ricardo, M;
Publication
COMPUTER COMMUNICATIONS
Abstract
IPTV services consist of multiple video channels grouped in bundles, such as sports, movies or generic bundles; users typically subscribe multiple bundles, including the generic bundle. Secure IP multicast can be used to implement IPTV services, but it still has problems to be addressed. Current solutions require high computational power in video channel zapping situations, lack support for groups sourced at the users, and present a weak support for admission control in IP multicast for both sources and receivers in dynamically configured environments. This work proposes a new, secure and efficient IPTV solution that, cumulatively: (a) enforces individual access control to groups of real-time IPTV video channels; (b) enforces IP multicast admission control for both multicast senders and receivers; (c) supports user generated videos; (d) generates low signaling overheads; (e) does not introduce perceivable delays, particularly in video channel zapping situations. Moreover, this solution can be easily integrated in the IPTV architectures being developed by ETSI and ITU-T.
2011
Authors
Teixeira, F; Calçada, T; Ricardo, M;
Publication
Mobile Networks and Management - Third International ICST Conference, MONAMI 2011, Aveiro, Portugal, September 21-23, 2011, Revised Selected Papers
Abstract
A Wireless Mesh Network (WMN) is an effective solution to provide Internet connectivity to large areas and its efficiency may increase if multiple radio channels are used in the mesh backbone. This paper proposes a protocol for centralized channel assignment in single-radio WMNs. This protocol has the capability to discover all the links available between Mesh Access Points (MAPs), independently of the channel they operate. With this information, a network manager can assign the right channel to each MAP in order to, for instance, maximize the network throughput. The proposed protocol extends WiFIX [1] which is a low overhead solution for implementing IEEE 802.11-based WMNs. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.
2011
Authors
Pereira, F; Theis, C; Moreira, A; Ricardo, M;
Publication
2011 INTERNATIONAL CONFERENCE ON INDOOR POSITIONING AND INDOOR NAVIGATION
Abstract
Accurate localization techniques have long been of major importance for safety systems and a lot of research has been conducted in the distributed computing field regarding its functionality and reliability. In the specific scenario of long yet narrow tunnels existing at CERN, localization methods will enable a number of applications and processes to substantially reduce human intervention. In this paper we evaluate the use of Fingerprinting techniques with GSM signal available throughout the LHC tunnel via a radiating cable and compare some methods to estimate the location. The existing GSM infrastructure and tunnel conditions seem to be favorable to the adoption of these Fingerprinting methods. Nevertheless significant variations in the signal have been observed which might be traced back to different operational states of accelerator equipment. These effects and their sources will be analyzed in more detail in order to improve the applied techniques and their accuracy under such challenging conditions.
2011
Authors
Cardoso, T; Neves, P; Ricardo, M; Sargento, S;
Publication
Proceedings of the 73rd IEEE Vehicular Technology Conference, VTC Spring 2011, 15-18 May 2011, Budapest, Hungary
Abstract
The growth of available broadband access technologies has brought an enormous challenge for operators wanting to ensure seamless mobility to its customers in heterogeneous environments. In this paper we present an enhanced Mobility Management entity focused on a real heterogeneous environments and based on IEEE802.21 standard. This entity is capable to perform terminal and handover management regardless the access technology used. This entity was deployed in a real heterogeneous environment with Wi-Fi, WiMAX and HSPA using an Android smartphone. In order to provide Layer 3 mobility support it was integrated with a modified version of MIPv6. The results show not only the impact of a centralized entity to manage vertical handovers, but also the performance of IEEE802.21 protocol in a real scenario with a real implementation. ©2011 IEEE © 2011 IEEE.© 2011 IEEE.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.