Current medium access control mechanisms are based on collision avoidance and collided packets are discarded. The recent work on ZigZag decoding departs from this approach by recov...
Ali ParandehGheibi, Jay Kumar Sundararajan, Muriel...
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
One approach to facilitate statistical multiplexing of bursty sources in ATM networks is dispersion of the traffic over independent paths. It has been shown within the literature ...
— We consider the sensing of the frequency spectrum based on energy detection for cognitive radios. It has been shown that the reliability of the sensing can be improved by using...
Olivier van den Biggelaar, Jean-Michel Dricot, Phi...
Abstract— In this paper, we address the problem of voice multicasting in ad hoc wireless networks. The unique characteristics of voice traffic (viz. small packet size, high pack...
G. Venkat Raju, Tamma Bheemarjuna Reddy, C. Siva R...