Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...
Abstract—Adaptive Token Bank Fair Queuing (ATBFQ) algorithm has been proposed as a cross-layer scheduling technique for 4G wireless systems recently. This algorithm takes higher ...
Feroz A. Bokhari, Halim Yanikomeroglu, William K. ...
Abstract—We evaluate the system-level performance and potential capacity gain of MBSFN (Multicast/Broadcast Single Frequency Network) operation in Wideband CDMA (WCDMA) and compa...
Christoph A. Jotten, Christian Sgraja, Josef J. Bl...
— In this paper, we introduce and outline the concept of Channel Code Division Multiple Access (CCDMA) using a design example based on the recently proposed Multilevel Structured...
Nicholas Bonello, Rong Zhang, Sheng Chen, Lajos Ha...