This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
We consider allocating the transmit powers for a wireless multi-link (N-link) system, in order to maximize the total system throughput under interference and noise impairments, and...
Wireless Mesh Networks (WMNs) have recently gained increasing attention and have emerged as a technology with great potential for a wide range of applications. WMNs can be conside...
Asad Amir Pirzada, Marius Portmann, Jadwiga Induls...
Voice over Internet Protocol (VoIP) over Wireless Local Area Network (WLAN) is becoming popular thanks to its cost efficiency. However, it has been a challenge to provide good qual...
The erasure resilience of rateless codes, such as Luby-Transform (LT) codes, makes them particularly suitable to a wide variety of loss-prone wireless and sensor network applicati...
Andrew Hagedorn, Sachin Agarwal, David Starobinski...