Cyber-criminals around the world are using Internet-based communication channels to establish trade relationships and complete fraudulent transactions. Furthermore, they control an...
Hanno Fallmann, Gilbert Wondracek, Christian Platz...
Mobile devices should allow users to exploit services anytime, without any place restriction and in a transparent way. The Bluetooth technology achieves this feature, by providing...
Vincenzo Auletta, Carlo Blundo, Emiliano De Cristo...
Abstract--This paper investigates throughput-efficient relay ARQ protocols for single carrier MIMO systems with amplify-and-forward relaying. We focus on reducing the multiplexing ...
The problems involved in the development of user interfaces become even more severe through the ubiquitous use of a variety of devices such as PCs, mobile phones and PDAs. Each of...
— We address the problem of selecting an appropriate relay station for forwarding data from a source to a destination node in dual-hop communication systems. In this regard, we f...