—This work presents a closed-form expression for characterizing the spread of static worm-scanning strategies through a mean-field approximation. Our model can both accurately c...
—We consider the design of a P2P network for the distribution of real-time video streams through the Internet. We follow a multi-source approach where the stream is decomposed in...
Abstract— The 802.15.4 WSN standard provides optional reliability through positive acknowledgments. Since positive-ACKs are not designed for energy efficiency, there is significa...
Abstract— We propose an enhanced physical-layer authentication scheme for multi-carrier wireless systems, where transmission bursts consist of multiple frames. More specifically...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
— We consider relaying strategies for two-way relay channels, where two terminals transmits simultaneously to each other with the help of relays. A memoryless system is considere...
—Space-time block codes (STBCs) that are single-symbol decodable (SSD) in a co-located multiple antenna setting need not be SSD in a distributed cooperative communication setting...
—This paper proposes to use Contourlet transform for image compression and feature extraction for wireless face recognition system. The properties of face images and face recogni...
Yanjun Yan, Rajani Muraleedharan, Xiang Ye, Lisa A...
Abstract— We present an analytical study on the error performance of differential unitary space-time modulation (DUSTM) over multiple-input multiple-output (MIMO) channels with n...
—The recent surge of peer-to-peer (P2P) networks consisting of thousands of of hosts makes them a breeding ground for malware proliferation. Although some existing studies have s...