The major requirement for Cognitive Radio (CR) based opportunistic spectrum re-usage is reliable protection of the primary communication. This calls for a reliable detection of the...
Christian Dombrowski, Daniel Willkomm, Adam Wolisz
The design of crosstalk mitigation techniques for DSL broadband access systems has mainly focused on physical layer transmit rate maximization. However, for certain applications, u...
Beier Li, Paschalis Tsiaflakis, Marc Moonen, Joche...
We analyze the performance of a DHT-based P2P overlay network in resource access and overlay maintenance activities. We use a cross-platform implementation of the protocol called P...
Abstract--We address the problem of detecting characteristic patterns in communication networks. We introduce a scalable approach based on set-system discrepancy. By implicitly lab...
A large number of data mining methods are, as such, not applicable to fast, intuitive, and interactive use. Thus, there is a need for visually controllable data mining methods. Suc...