In this paper, we consider a MIMO wireless relay network where communication between a source and a destination node is assisted by multiple relay nodes using the Amplifyand-Forwar...
Existing distributed hash tables provide efficient mechanisms for storing and retrieving a data item based on an exact key, but are unsuitable when the search key is similar, but ...
Abstract-- Elastic applications are primarily interested in minimal delay achievable for their messages under current network load. In this paper, we investigate how to transmit su...
This paper describes and discusses challenges related to development of peer-to-peer games in J2ME using the available Bluetooth API (JSR82). By using Bluetooth on wireless device...
Alf Inge Wang, Michael Sars Norum, Carl-Henrik Wol...
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...