—The design of efficient packet scheduling algorithms is crucial to the radio resource management (RRM) in the satellite digital multimedia broadcasting (SDMB) system, which has ...
—We consider the adaptive throughput optimization problem for multiple-input multiple-output (MIMO) systems in Rayleigh fading channels. With perfect channel knowledge at the tra...
—The localization of the sensor node is a fundamental problem in sensor networks and can be implemented using powerful and expensive beacons. Beacons, the fewer the better, can a...
— In this paper, we propose an endpoint-based joint network-host anomaly detection technique to detect selfpropagating malicious codes. Our proposed technique is based on the obs...
—This paper presents a mathematical framework for resource reservation in TCP/IP networks by invoking a dynamic system viewpoint on the congestion monitoring processes occurring ...
—Network Intrusion Detection Systems (NIDS) are more and more important in today’s network security for identifying and preventing malicious attacks over the network. This pape...
— This paper addresses the performance evaluation of multi-carrier code division multiple access systems both at physical and TCP levels. A partial equalization technique improvi...
Giacomo Leonardi, Barbara M. Masini, Alessandro Ba...
— In wireless networks, the use of collaboration has been shown to provide an increase in reliability due to an increase in diversity. Specifically it has been shown that by havi...
Patrick Tooher, Hesam Khoshneviss, M. Reza Soleyma...