We propose a Polynomial-based scheme that addresses the problem of Event Region Detection (PERD) for wireless sensor networks (WSNs). Nodes of an aggregation tree perform function ...
Torsha Banerjee, Demin Wang, Bin Xie, Dharma P. Ag...
—We consider an Internet telephony system in which the service provider operates a telephone gateway in each servicing city to serve the general public. We propose a packet loss ...
— Decision directed channel tracking (DDCT) at high fade rates in OFDM based systems is addressed in this paper. Existing DDCT algorithms like the expectation-maximization (EM) a...
— Rerouting is a viable and cost-effective approach to decrease the blocking probability in legacy circuit-switched networks. We study lightpath rerouting in optical WDM networks...
— In this paper, we explore the use of partially overlapped channels in wireless mesh networks that consist of multiple 802.11-based access points. We propose novel channel alloc...
— A matrix is described that transforms input vectors (blocks) of length (K − 2), consisting of digital PAM vector components, into output vectors (blocks) of length K. The mat...
— Block based motion compensation techniques are commonly used in video encoding to reduce the temporal redundancy of the signal. In these techniques, each block in a video frame...
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
— In this paper a new transmitter precoding technique is presented that outperforms conventional precoding by making use of a portion of the interference between the users in a C...
—Dirty paper code (DPC) can be used in a number of communication network applications; broadcast channels, multiuser interference channels and ISI channels to name a few. We stud...