We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable security, from various well-known assumptions such as DDH, d-Linear, QR, DCR, and LWE. To t...
We propose an admission control policy for wireless multimedia networks that is based on the well known threshold-based guard channel method. The new scheme deals with two differen...
Mahmoud T. El-Hadidi, Khaled M. F. Elsayed, Mohame...
Power consumption, particularly runtime leakage, in long on-chip buses has grown to an unacceptable portion of the total power budget due to heavy buffer insertion to combat RC de...
Harmander Deogun, Rajeev R. Rao, Dennis Sylvester,...
—Rate adaptation based on Signal-to-Noise Ratio (SNR) measurements is a common channel adaptation scheme to increase throughput in wireless communication systems. To use rate ada...
Hermann S. Lichte, Stefan Valentin, Holger von Mal...
Abstract—The sparse network topology, coupled with the limited availability of reference nodes in Under Water Sensor Network (UWSN), significantly reduces the effectiveness of m...