— Providing anonymity for end-users on the Internet is a very challenging and difficult task. There are currently only a few systems that are of practical relevance for the prov...
Abstract--The concept of cognitive radio (or secondary spectrum access) is currently under investigation as a promising paradigm to achieve efficient use of the frequency resource ...
Osvaldo Simeone, Igor Stanojev, Stefano Savazzi, Y...
The requirements of multimedia underwater monitoring applications with heterogeneous traffic demands in terms of bandwidth and end-to-end reliability are considered in this artic...
We use reconfigurable hardware to construct a high throughput Bayesian computing machine (BCM) capable of evaluating probabilistic networks with arbitrary DAG (directed acyclic gr...
— 1 Taking advantage of the independent fading channel conditions among multiple wireless users, opportunistic transmissions schedule the user with the instantaneously best condi...