—Due to the potential of enhancing traffic safety, protecting environment, and enabling new applications, vehicular communications, especially vehicle-to-vehicle (V2V) communica...
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Telephony over IP is exposed to multiple security threats. Conventional protection mechanisms do not fit into the highly dynamic, open and large-scale settings of VoIP infrastructu...
The rising costs of energy and world-wide desire to reduce CO2 emissions has led to an increased concern over the energy efficiency of information and communication technology. Wh...
Andreas Berl, Nicholas J. P. Race, Johnathan Ishma...
Probabilistic flooding has been frequently considered as a suitable dissemination information approach for limiting the large message overhead associated with traditional (full) f...
Konstantinos Oikonomou, Dimitrios Kogias, Ioannis ...
Relaying technique has been developed considerable attention in response to improve reliability and to extend wireless network coverage. One of conventional relaying technique, inc...
In this paper syndrome former trellis construction for punctured convolutional codes (PCCs) is discussed. The class of (np - 1)/np-rate PCCs derived from 1/n-rate mother codes is c...