Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
—This paper investigates the tradeoff between throughput and feedback delay of limited feedback beamforming in indoor wireless channels with a practical MIMO-OFDM prototype. Past...
Robert C. Daniels, Ketan Mandke, Kien T. Truong, S...
We have designed and built a set of miniature robots called Scouts and have developed a distributed software system to control them. This paper addresses the fundamental choices we...
Paul E. Rybski, Sascha Stoeter, Maria L. Gini, Dea...
—Increasingly wireless networks use multi-antenna nodes as in IEEE 802.11n and 802.16. The Physical layer (PHY) in such systems may use the antennas to provide multiple streams o...
Wonsoo Kim, O. Khan, Kien T. Truong, Soon-Hyeok Ch...
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...