Abstract--By using cognitive radio technology, opportunistic spectrum access has the potential to solve the underused spectrum problem. In this paper, we employ class-based call ad...
Abstract— Throughput performance of the IEEE 802.11 Distributed Coordination Function (DCF) is very sensitive to the number n of competing stations. The contribute of this paper ...
We present a cryptographic architecture optimization technique called divide-and-concatenate based on two observations: (i) the area of a multiplier and associated data path decre...
— In this paper, we compare the performance of wireless local area networks (WLANs) with single-user MIMO (SU-MIMO) and multi-user MIMO (MU-MIMO) in terms of collision probabilit...
Hu Jin, Bang Chul Jung, Ho Young Hwang, Dan Keun S...
A large number of the MAC protocols proposed for establishing wireless sensor networks are based on the 802.11 standard. The trade-off in these protocols is the control packet ov...