Distance bounding is often proposed as a countermeasure to relay attacks and distance fraud in RFID proximity identification systems. Although several distance-bounding protocols...
Much work in AI deals with the selection of proper actions in a given (known or unknown) environment. However, the way to select a proper action when facing other agents is quite ...
Abstract— We present an analytical study on the error performance of differential unitary space-time modulation (DUSTM) over multiple-input multiple-output (MIMO) channels with n...
Over the past few years, with the rapid adoption of broadband communication and advances in multimedia content capture and delivery, web-based meetings and lectures, also referred...
— In this paper, we present a Minimum Spanning Tree (MST) based topology control algorithm, called Local Minimum Spanning Tree (LMST), for wireless multi-hop networks. In this al...