— The FPGA design of an adaptive antenna array beamformer is presented. The complex-valued array weights are calculated using the MVDR algorithm whose implementation is based on ...
Jie Liu, Ben Weaver, Yuriy V. Zakharov, George Whi...
–Retransmission based schemes are not suitable for energy constrained wireless sensor networks. Hence, there is an interest in including parity bits in each packet for error cont...
Saad B. Qaisar, Shirish S. Karande, Kiran Misra, H...
—We present a multi-constrained routing algorithm, called Delay-constrained Pool Sharing (DPS), in a survivable mesh network. The goal of this algorithm is to find a pair of link...
—In this paper, the IEEE 802.16 protocol is investigated with respect to the bandwidth provision problem arising at the Medium Access Control (MAC) layer. The aim is to optimally...
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
— A firewall’s complexity is known to increase with the size of its rule set. Complex firewalls are more likely to have configuration errors which cause security loopholes. ...
— Traditional multiple-antenna detectors – which search a tree or a lattice structure – typically apply a metric that requires a preprocessing. Contrary to that, we present a...
: In this paper, we propose a group-based location service (GrLS) for mobile ad hoc networks (MANETs). The novelty of GrLS is in its exploitation of group mobility to improve the p...