—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
—In an n-way broadcast application, each one of n overlay nodes wants to push its own distinct large data file to all other n À 1 destinations as well as download their respecti...
Georgios Smaragdakis, Nikolaos Laoutaris, Pietro M...
— In this contribution, we propose an adaptive Turbo Trellis Coded Modulation (TTCM) aided Distributed Space-Time Trellis Coding (STTC) scheme for cooperative communication over ...
Soon Xin Ng, Chuyi Qian, Dandan Liang, Lajos Hanzo
Cognitive radio (CR) has been considered a key technology to enhance overall spectrum utilization by opportunistic transmissions in CR transmitter-receiver link(s). However, CRs m...
We introduce a novel multi-agent patrolling strategy. By assumption, the swarm of agents performing the task consists of very low capability ant-like agents. The agents have littl...