Abstract— Presteering of broadband antenna arrays is required to compensate the effect of misalignment between the look direction and the array geometry and is achieved by insert...
—Conventional 802.11 medium access control (MAC) characteristics. In particular, all of these designs adopted a protocols have been designed separately from the characteristics s...
— We present an architecture for the provision of network layer privacy based on the SHIM6 multihoming protocol. In its basic form, the architecture prevents on-path eavesdropper...
—Computation of the undetected error probability for error correcting codes over the Z-channel is an important issue, explored only in part in previous literature. In this paper ...
Franco Chiaraluce, Marco Baldi, Susanna Spinsante,...
— Most of the existing WLAN MAC protocols can only provide limited service differentiation. In this paper, we propose a novel token-based scheduling scheme for precise and quanti...
Abstract— A computationally efficient optimal double correlation (ODC) filter, which works on the fourth order statistics of received samples, is proposed for carrier frequency...
—Most of the deployed IEEE 802.11 Wireless Local Area Networks (WLANs) use infrastructure Basic Service Set (BSS) in which an Access Point (AP) serves as a gateway between wired ...
Abstract— Many sensor networks (SN) use in-network aggregation to minimize the amount of data transmitted by sensors. Unfortunately, aggregation makes the network more vulnerable...
—Robust and flexible speech codecs are required more and more by speech communication over unreliable and heterogeneous channels such as the internet. In this paper, a novel mult...