— Recent studies indicate the presence of a significant amount of idle licensed spectrum, in different time periods and geographic locations. Prompted by the latest regulatory ch...
George Alyfantis, Giannis F. Marias, Stathes Hadji...
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
— A fundamental goal of a wireless sensor network (WSN) is to collect and deliver data to external applications. Due to the strong constraints of these networks, routing algorith...
Carlos Mauricio S. Figueiredo, Eduardo Freire Naka...
— In this paper, we address the impact of different access strategies in ad hoc networks with multiple antennas and MIMO communications. We employ a cross–layer designed MAC pr...
— Consider the task of searching a region for the presence or absence of a target using a team of multiple searchers. This paper formulates this search problem as a sequential pr...