At a cocktail party, a listener can selectively attend to a single voice and filter out other acoustical interferences. How to simulate this perceptual ability remains a great cha...
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
— Channel state information (CSI) is important for achieving large rates in MIMO channels. However, in timevarying MIMO channels, there is a tradeoff between the time/energy spen...
Sugumar Murugesan, Elif Uysal-Biyikoglu, Philip Sc...
This paper proposes a scheme of optimal resource management for reverse-link transmissions in multimedia wideband code-division multiple-access (WCDMA) communications. It is to gua...
Majid Soleimanipour, Weihua Zhuang, George H. Free...