— The connected dominating set (CDS) has been extensively used for routing and broadcast in mobile ad hoc networks. While existing CDS protocols are successful in constructing CD...
Kazuya Sakai, Fangyang Shen, Kyoung Min Kim, Min-T...
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
—Layered streaming in overlay networks has drawn great interests since not only can it accomodate large scales of clients but also it handles client heterogeneities. However, to ...
—In battery-constrained large-scale sensor networks, nodes are prone to random failures due to various reasons, such as energy depletion and hostile environment. Random failures ...
— The performance of a wireless multimedia sensor network (WMSN) is tightly coupled with the pose of individual multimedia sensors. In particular, orientation of an individual mu...
— The analytical end-to-end (e2e) performance of a wireless multihop network is largely unknown, because of the interconnections between several factors involved. Customarily, th...
—The issue of data-aided joint carrier frequency offset (CFO) and channel estimation is investigated in the presence of a rapidly time-varying frequency-selective channel. We der...
— Systematic Luby Transform (SLT) codes have shown good performance for single antenna aided systems for transmission over AWGN and uncorrelated Rayleigh fading channels. For the...
Thanh Dang Nguyen, Mohammed El-Hajjar, Lie-Liang Y...
Abstract— Joint eigenvalue distribution of the noncentral complex Wishart matrix, i.e. HH∗ where H is the nonzero-mean complex Gaussian random channel matrix of a multiple-inpu...