— Traditional network routing uses the single (shortest) path paradigm. This paradigm leaves the session vulnerable to a variety of security threats, such as eavesdropping. We pr...
The integration of different IP-based wireless networks, such as WiMAX and WiFi, becomes a 2-tier heterogeneous wireless networks is a more and more popular issue. In order to supp...
I-Shyan Hwang, Bor-Jiunn Hwang, K. Robert Lai, Lin...
Computational depth estimation is a central task in computer vision and graphics. A large variety of strategies have been introduced in the past relying on viewpoint variations, de...
In this paper, a novel relaying strategy that uses multiple input multiple output (MIMO) fixed relays with linear processing to support multiuser transmission in cellular networks...
Chan-Byoung Chae, Taiwen Tang, Robert W. Heath Jr....
Abstract—In this paper, the calculation of saturation throughput for previously proposed Multi-User - Distributed Coordination Function (MU-DCF) is presented. MU-DCF is an IEEE 8...