— Radio Frequency Identification (RFID) systems have provided promising solutions to effective identification of a large number of tagged objects. However, RFID systems suffer ...
— Ad hoc network users are resource constrained: Before transmitting data, they have to take into account the energy expenditure involved. Even if a user is, in principle, willin...
— We compare the performance of various dynamic query abolishment mechanisms in different unstructured overlay network topologies such as found in several P2P systems. We speci...
Telecommunication companies, such as Internet and cellular service providers, are seeing rapid and uncertain growth of traffic routed through their networks. It has become a chall...
Miguel F. Anjos, Michael Desroches, Anwar Haque, O...
This paper outlines trends reshaping the business of International Long Distance (ILD) voice minutes trading. Our analysis is centered on Arbinet’s business model: an electro...
— Peer to Peer (P2P) flows constitute a large portion of Internet traffic meandering through different ISP domains. Hence, it is of prime concern for ISPs to try and gauge the ...
— In deadline-based networks, the delay performance experienced by real-time data transfer largely depends on traffic deadlines and the load level along the data transfer path. ...
— This paper proposes two frequency offset estimation algorithms for the uplink of an Interleaved Frequency-Division Multiple-Access (IFDMA) system. One algorithm performs estima...
Abstract— Carriers conveying long-distance traffic face different routing options with regard to service quality and cost. Thus, Least Cost Routing (LCR) solutions supporting op...
Piotr Cholda, Miroslaw Kantor, Andrzej Jajszczyk, ...