— High variability of access resources in heterogenous wireless networks and limited computing power and battery life of mobile computing devices such as smartphones call for nov...
Dimitrios Tsamis, Tansu Alpcan, Jatinder Pal Singh...
—A major performance-limiting factor in terrestrial optical wireless (OW) systems is turbulence-induced fading. Exploiting the additional degrees of freedom in the spatial dimens...
Nestor D. Chatzidiamantis, Murat Uysal, Theodoros ...
Abstract—Impulse Radio Ultra-wideband (IR-UWB) communication has proven an important technique for supporting highrate, short-range, low-power communication. These are necessary ...
—The Host Identity Protocol (HIP) has been specified by the IETF as a new solution for secure host mobility and multihoming in the Internet. HIP uses self-certifying publicpriva...
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...
—This paper presents a theoretical estimation for idle channel time in a multi-hop environment. Idle channel time is the time proportion of a node during which the channel state ...
In this paper we present an alternative separable implementation of L2 -orthogonal space-time codes (STC) for continuous phase modulation (CPM). In this approach, we split the STC...
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...
—To date, most studies on spam have focused only on the spamming phase of the spam cycle and have ignored the harvesting phase, which consists of the mass acquisition of email ad...
Kevin S. Xu, Mark Kliger, Yilun Chen, Peter J. Woo...