Due to the lack of QoS support, ensuring an acceptable application level QoS for the real-time delivery of multiobject multimedia presentations on the current Internet is very cha...
For most of the time since they were proposed, it was widely believed that hyperelliptic curve cryptosystems (HECC) carry a substantial performance penalty compared to elliptic cur...
Jan Pelzl, Thomas J. Wollinger, Jorge Guajardo, Ch...
Wireless sensor networks (WSNs) are subject to significant resource constraints. Particularly, routing protocols for lowrate WSNs suffer from maintaining routing metrics and sta...
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintention...
— In this paper1 an optimum and sub-optimum maximum likelihood (ML) rule for joint frame and carrier frequency offset estimation are derived, which rely on the transmission of a...