Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
Mobile devices with multi-touch capabilities are becoming increasingly common, largely due to the success of the Apple iPhone and iPod Touch. While there have been some advances in...
Matthew N. Bonner, Jeremy T. Brudvik, Gregory D. A...
—Transmitter Leakage has a significant impact on the system performance in mobile devices using zero-IF receivers and thus requires a suitable compensation. In contrast to analo...
Abstract—Cognitive Radio Networks aim at enhancing spectrum utilization by allowing cognitive devices to opportunistically access vast portions of the spectrum. To reach such amb...
— High variability of access resources in heterogenous wireless networks and limited computing power and battery life of mobile computing devices such as smartphones call for nov...
Dimitrios Tsamis, Tansu Alpcan, Jatinder Pal Singh...