— We derive formulas for the energy J(n) that a station’s radio consumes when it transmits 1 MB of data in an IEEE 802.11 network with n stations. Calculations show that J(n) g...
Abstract— Target tracking is a canonical issue in sensor networks research. However, tracking security has gained little or no attention. Once a sensor node is compromised, it wi...
Chih-Chieh Geoff Chang, Wesley E. Snyder, Cliff Wa...
— We consider a multi-user MIMO downlink where the transmitter has only estimates of the channel while the receivers have perfect channel information. The impact of channel estim...
— In cognitive radio systems, secondary users can be coordinated to perform cooperative spectrum sensing so as to detect the primary user more accurately. However, when the sensi...
— This paper describes a framework for addressing the administration of role delegation introduced in the wellknown role-based access control model (RBAC). More specifically, thi...