This paper presents a technique for an intelligent robot to adaptively behave in unforeseen and dynamic circumstances. Since the traditional methods utilized the relatively reliabl...
—This paper presents a novel strategy for interference mitigation in an uplink of high reuse cellular networks through distributive processing. It is proposed that the neighborin...
This paper presents Kosha, a peer-to-peer (p2p) enhancement for the widely-used Network File System (NFS). Kosha harvests redundant storage space on cluster nodes and user desktop...
Ali Raza Butt, Troy A. Johnson, Yili Zheng, Y. Cha...
—One way of modelling the wireless channel is in a statistical manner, based on a few parameters describing the characteristics of the environment. In most current wireless chann...
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...