— Trellis codes based on linear congruential recursions have recently been introduced as powerful source codes. For a modest computational complexity they offer excellent rate di...
— We consider the problem of detecting a primary user signal over a wireless channel by a cognitive radio with multiple antennas. We present a multiple antenna processing based e...
—The notion of p-cycle (Preconfigured Protection Cycle) allows capacity efficient schemes to be designed for fast span protection in WDM mesh networks. Conventional p-cycle const...
Bin Wu, Kwan Lawrence Yeung, King-Shan Lui, Shizho...
—While transparent WDM optical networks become more and more popular as the basis of the Next Generation Internet (NGI) infrastructure, such networks raise many unique security i...
Jae-Seung Yeom, Ozan K. Tonguz, Gerardo A. Casta&n...
— This paper investigates a fair resource allocation method in crosstalk limited DSL (Digital Subscriber Line) systems. As a measure of fairness, the concept of Balanced Capacity...
Abstract— We describe a decentralized learning-based activation algorithm for a ZigBee-enabled unattended ground sensor network. Sensor nodes learn to monitor their environment i...
— We present and evaluate the design of a new and comprehensive solution for automated worm detection and immunization. The system engages a peer-to-peer network of untrusted mac...
—The fundamental component for the success of VANET (Vehicular Ad hoc NETworks) applications is routing since it must efficiently handle rapid topology changes and a fragmented n...
Abstract—Carrier Frequency Offset (CFO) estimation is critical in practical orthogonal frequency-division multiplexing (OFDM) systems. In this paper, we propose two novel blind C...