This paper describes a design space exploration experiment for a real application from the embedded networking domain - the physical layer of a wireless protocol. The application ...
Laura Vanzago, Bishnupriya Bhattacharya, Joel Camb...
We develop the theme of an earlier paper [3], namely that security protocols for pervasive computing frequently need to exploit empirical channels and that the latter can be classi...
Sadie Creese, Michael Goldsmith, Richard Harrison,...
Abstract. In this paper, we present a protocol for collaborative translation, where two non-bilingual people who use different languages collaborate to perform the task of transla...
Abstract - In this paper we present a design of a medium access control protocol that allows the utilization of unused licensed spectrum of deployed wireless cellular systems (Prim...