作者:
李路明胡振燕罗斌郭弘Department of Communication
Jiangxi Electric Power Information and Communication Company CREAM Group
State Key Laboratory of Advanced Optical Communication Systems and Networks (Peking University) and Institute of Quantum ElectronicsSchool of Electronics Engineering and Computer SciencePeking University
This paper investigates the breaking point between fast- and slow-light in a degenerate two-level atomic system, where fast-light can be converted to slow-light arbitrarily on a single transition line by adjusting the...
详细信息
This paper investigates the breaking point between fast- and slow-light in a degenerate two-level atomic system, where fast-light can be converted to slow-light arbitrarily on a single transition line by adjusting the strength of the pumping field. An equivalent incoherent pumping rate is introduced in this simplified theoretical model which exploits the dependence of this feature. The experimental observation is presented as evidence of the breaking point where the injected power is about 0.08 mW.
A data-aided frequency offset estimation algorithm suited for burst-mode communications is described and analyzed. The proposed algorithm is based on a Pilot symbol assisted modulation (PSAM) frame structure, which co...
详细信息
A data-aided frequency offset estimation algorithm suited for burst-mode communications is described and analyzed. The proposed algorithm is based on a Pilot symbol assisted modulation (PSAM) frame structure, which consists of regularly spaced pilot symbols and a group of consecutive pilot symbols embedded in. Firstly, an initial estimate based on consecutive pilot symbols is generated for reducing the phase ambiguity. Secondly, based on both spaced and consecutive pilot symbols, fine preliminary estimates are generated to improve estimation accuracy. Lastly, the final estimate is obtained by combining the fine preliminary estimates with the initial. This three-step algorithm is shown to provide high estimation accuracy close to those of FFT-based algorithm at low Signal-to-noise ratio (SNR). In addition, it is suitable for high carrier frequency offset cases.
Localization is one of the important technical issues of wireless sensor networks. Based on the traditional genetic algorithm applied in node localization, this paper introduces pattern search algorithm for the select...
详细信息
Fractional frequency reuse is one of the key interference mitigation schemes of the IEEE 802.16m draft standard. This paper proposes a resource allocation strategy for the uplink fractional frequency reuse in the vari...
详细信息
Public acceptance, and thus the economical success of Vehicular Ad Hoc networks (VANETs), is highly dependent on the quality of deployed privacy mechanisms. Neither users nor operators should be able to track a given ...
详细信息
KAD is one of the largest scale DHT based on real applications. Measurements on KAD is a good approach for researching DHT. Many different active and passive measurements have been made on those systems, and crawlers ...
详细信息
KAD is one of the largest scale DHT based on real applications. Measurements on KAD is a good approach for researching DHT. Many different active and passive measurements have been made on those systems, and crawlers are novel approach in active measurement. A crawler begins crawling into the DHT with a basic set of given nodes, sending node searching requests to the nodes in the given set for contact information from more unknown nodes. There are three goals in mind while we design the crawler: finishing crawling the given nodes set as soon as possible; retrieving more nodes information after the crawling; getting result while sending as few network packets as possible. The above goals are correlated with each other. Optimizing one may impact others. This paper proposes a basic DHT crawler framework and discusses possible extension to the framework. After that we exploit the fact that the connectivity in the overlay network is universality, thus we do not need to crawl the whole overlay network space while maintaining the crawling affect.
In this paper, we propose a deterministic greedy heuristic providing a construction layout for a cost-efficient multilayer network that is able to carry a given set of traffic demands with and without protection on di...
详细信息
ISBN:
(纸本)9781424481668
In this paper, we propose a deterministic greedy heuristic providing a construction layout for a cost-efficient multilayer network that is able to carry a given set of traffic demands with and without protection on different layers. We apply the heuristic to different reference network topologies and protection requirements. Evaluations are conducted regarding equipment cost on different layers, blocking probability, path lengths, and number of demands affected by specific failures.
The formal verification of task schedulability is getting more important in the automotive domain as more and more applications are integrated into domain specific controllers. Especially for safety critical applicati...
详细信息
In a virtualized environment, all the resource are managed by a virtual machine monitor (VMM). Virtualization technology creates separate, isolated and secure running environments for operating systems, programs or ap...
详细信息
Internet technologies are making rapid progress, but achieving high performance of network application over the WAN remains a challenge. When branch office's workers access enterprise applications locating in data...
详细信息
暂无评论