Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Abstract—An analysis of narrow- and broadband interference robustness within an On-Off Keying/Binary Pulse Position Modulation based noncoherent multiband impulse radio ultrawide...
In this paper we address three challenges that are present when building and analyzing wireless sensor networks (WSN) as part of ubiquitous computing environment: the need for an ...
This paper introduces the notion of profile-based cooperation as a way to support awareness and informal communication between mobile users during chance encounters. We describe th...
Gerd Kortuem, Zary Segall, Thaddeus G. Cowan Thomp...
— This paper examines the bit error probability (BEP) of bit-interleaved coded modulation and iterative decoding (BICM-ID) in OFDM systems with modulation diversity (MD) over cor...