Abstract— Spectrum-agile radios, also known as cognitive radios, have a great potential to improve spectrum utilization by enabling dynamic access to the spectrum. A key challeng...
— Wireless multi-hop, mesh networks are being considered as a candidate to backhaul data traffic from access networks to the wired Internet. These mesh networks are referred to a...
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
—In this letter, we implement a simplified version of the Cover - van der Meulen - Hajek - Pursley (CMHP) coding originally characterized by Wajcer, Wiesel, and Shamai. The vect...
Hyung-Tae Kim, Sung Hoon Lim, Inkyu Lee, Saejoon K...
Hardware signatures have been recently proposed as an efficient mechanism to detect conflicts amongst concurrently running transactions in transactional memory systems (e.g., Bulk...