Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
— We present a precoded reduced-complexity soft detection (PRCSD) algorithm for spatial multiplexing systems. The linear operations at both transmit and receive sides based on co...
In this paper, we propose a distributed hierarchical intrusion detection system, for ad hoc wireless networks, based on a power level metric for potential ad hoc hosts, which is us...
T. Srinivasan, Jayesh Seshadri, J. B. Siddharth Jo...
Computer-Assisted Pronunciation Training System (CAPT) has become an important learning aid in second language (L2) learning. Our approach to CAPT is based on the use of phonologi...
—Spectrum awareness is a crucial first step of a cognitive radio (CR). This provides information necessary for the CR to adapt to the radio frequency environment, and involves re...
Qiyun Zhang, Octavia A. Dobre, Sreeraman Rajan, Ro...