A wireless transmitter learns of a packet loss, infers collision, only after completing the entire transmission. If the transmitter could detect the collision early (such as with ...
Souvik Sen, Romit Roy Choudhury, Srihari Nelakudit...
Distributed hash tables have been around for a long time [5, 7]. A number of recent projects propose peerto-peer DHTs, based on multi-hop lookup optimizations. Some of these syste...
Abstract. Exponentiation is a central process in many public-key cryptosystems such as RSA and DH. This paper introduces the concept of self-randomized exponentiation as an efficie...
We introduce a novel laser spectroscopic trace-gas sensor platform, LaserSPECks that integrates recently developed miniature quartz-enhanced photoacoustic spectroscopy (QEPAS) gas...
Stephen So, Farinaz Koushanfar, Anatoliy Kosterev,...
Many systems in sciences, engineering and nature can be modeled as networks. Examples are internet, metabolic networks and social networks. Network clustering algorithms aimed to ...
Nurcan Yuruk, Mutlu Mete, Xiaowei Xu, Thomas A. J....