Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by CTM

2010

Non-iterative frequency estimation in the DFT magnitude domain

Authors
Sousa, R; Ferreira, A;

Publication
Final Program and Abstract Book - 4th International Symposium on Communications, Control, and Signal Processing, ISCCSP 2010

Abstract
The accurate estimation of the frequency of sinusoids is a frequent problem in many signal processing problems including the real-time analysis of the singing voice. In this paper we rely on a single DFT magnitude spectrum in order to perform frequency estimation in a non-iterative way. Two new frequency estimation methods are derived that are matched to the time analysis window and that reduce the maximum absolute estimation error to about 0.1% of the bin width of the DFT. The performance of these methods is evaluated including the parabolic method as a reference, and considering the influence of noise. A combined model is proposed that offers higher noise robustness than that of a single model. ©2010 IEEE.

2010

Secure multicast in IPTV services

Authors
Pinto, A; Ricardo, M;

Publication
COMPUTER NETWORKS

Abstract
Technological evolution is leading telecommunications to all-IP networks where multiple services are transported as IP packets. Among these are the group communications services with confidentiality requirements. Secure IP multicast may be used to secure the broadcast of video channels. However, in scenarios such as cable TV where the concept of video channel and bundle are present, groups are very large, and users switch very rapidly between channels (zapping), a sort of problems still need to be addressed. The solution proposed in this paper addresses these problems. For that purpose, a centralized form of secure group communications is proposed also used to transmit, not data, but group cryptographic material. Threes types of cryptographic keys are used. End systems use this material to decrypt the data sent by the content providers.

2010

Using Directional Antennas on Stub Wireless Mesh Networks: Impact on Throughput, Delay, and Fairness

Authors
Kandasamy, S; Campos, RL; Morla, R; Ricardo, M;

Publication
Proceedings of the 19th International Conference on Computer Communications and Networks, IEEE ICCCN 2010, Zürich, Switzerland, August 2-5, 2010

Abstract
Wireless Mesh Networks (WMNs), which feature infrastructureless broadband network configurations, are attracting attention as an elemental technology when it comes to the extension of current WLAN infrastructures. State of the art solutions addressing WMNs usually assume the use of omnidirectional antennas. In this paper we evaluate the performance improvements obtained when using directional antennas. By using simulations, we analyze the gains in terms of throughput, delay and fairness, considering a grid network topology used to extend an infrastructure network. Simulation results show that by changing the type of antenna in use from omnidirectional to directional, the average throughput of a WMN can increase about 56% and the average network delay can be reduced by approximately 40%, without compromising fairness. © 2010 IEEE.

2010

Improving P2P video streaming in wireless mesh networks

Authors
Salta, N; Morla, R; Ricardo, M;

Publication
The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, Med-Hoc-Net 2010, Juan Les Pins, France, 23-25 June, 2010

Abstract
P2P Video Streaming has become a reliable and efficient solution for distributing video on the Internet. Similarly to regular P2P file-sharing, all the participating nodes exchange information. Wireless Mesh Networks, in turn, can be seen as a cost-effective solution to extend Internet access networks. In this paper we propose improvements to P2P Video Streaming. These improvements can provide gains in scenarios where the service is deployed over Wireless Mesh Networks and the nodes are simultaneously peers and packet forwarders. By using cross-layer interactions between application and network layers, we show that the proposed improvements reduce substantially the amount of traffic in the network. ©2010 IEEE.

2010

WiMetroNet A Scalable Wireless Network for Metropolitan Transports

Authors
Ricardo, M; Carneiro, G; Fortuna, P; Abrantes, F; Dias, J;

Publication
Sixth Advanced International Conference on Telecommunications, AICT 2010, 9-15 May 2010, Barcelona, Spain

Abstract
This paper addresses Wireless Networks for Metropolitan Transports (WNMT), a class of moving or vehicle-to-infrastructure networks that may be used by public transportation systems to provide broadband access to their vehicles, stops, and passengers. We propose the WiMetroNet, a WNMT that is auto-configurable and scalable. It is based on a new Ad hoc routing protocol, the Wireless Metropolitan Routing Protocol (WMRP), which, coupled with data plane optimizations, was designed to be scalable to thousands of nodes. © 2010 IEEE.

2010

An efficient mechanism for establishing IP connectivity in next-generation networks

Authors
Campos, R; Ricardo, M;

Publication
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS

Abstract
The changes in the communication paradigm envisioned for next-generation networks (NGNs), with peer-to-peer/symmetric attachments gaining momentum and two Internet Protocol (IP) versions coexisting, will pose new challenges to mobile communication networks. Traditional IP auto-configuration mechanisms will not work properly, since they were designed mostly having in mind a client-server/asymmetric attachment model, they assume a single IP version paradigm, and they target the auto-configuration of devices only. The IST Ambient Networks (ANs) project has introduced a new concept the AN that enables handling every communication entity, either a single device or an entire network, as an AN. This paper describes a new efficient mechanism, named Basic Connectivity (BC) mechanism, for auto-configuring IP connectivity between attaching ANs. A proof-of-concept prototype, experimental results, and theoretical analysis show that BC suites the future networking paradigm and represents a solution more efficient than the current trial-and-error mechanism for auto-configuring IP connectivity. Copyright (C) 2009 John Wiley & Sons, Ltd.

  • 296
  • 368