With the rapid growth of the Internet and pervasive computing activities, the migration of back-end legacy systems to network centric environments has become a focal point for res...
For a graph G and a set D V (G), define Nr[x] = {xi V (G) : d(x, xi) r} (where d(x, y) is graph theoretic distance) and Dr(x) = Nr[x] D. D is known as an r-identifying code if...
Abstract—This paper presents an Irregular Distributed Hybrid Concatenated Differential (Ir-DHCD) coding scheme contrived for the relayaided differential decode-and-forward (DDF) ...
Abstract—In this tutorial paper we analyze the capacity of bitinterleaved coded modulation (BICM) with quadrature amplitude modulation (QAM) constellations, and we pay special at...
Given a client/server application, how can the server entrust the integrity of the remote client, albeit the latter is running on an un-trusted machine? To address this research p...