Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Research on TCP performance relies either on simulation programs, which run on a single machine, or on the use of real testbeds, where different machines represent different netwo...
Carlo Caini, Rosario Firrincieli, Renzo Davoli, Da...
—The accuracy of Time of Arrival (TOA) measurements is significantly compromised due to the multipath components which coexist with the desired Line of Sight (LOS) components in ...
— Transmit preprocessing employed at the basestation (BS) has been proposed for simplifying the design of the mobile receiver. Provided that the channel impulse response (CIR) of...
— The IEEE 802.16j protocol for a multi-hop relay (MMR) WiMAX network is being developed to increase data rates and extend service coverage as an enhancement of existing WiMAX st...