In this paper, an interference relay channel where two independent sources communicate with two destinations by the help of a relay is studied. The relay is full-duplex and emplo...
— In recent years, several algorithms for controlling cognitive radio platforms have been proposed. In this paper, we review the existing approaches that have been developed for ...
Abstract—In this paper, a family of linear congruence sequences with interesting cross-correlation properties is investigated for potential applications in defining new multiple...
1 — Sampling is increasingly utilized by passive measurement systems to save the resources consumption. However, the widely adopted static linear sampling selects packets with th...
Abstract— Policy based networks provide high levels of flexibility by allowing definition of packet handling rules within a network, resource allocation strategies, network man...
Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam ...
— Over the last years, the Internet has evolved towards becoming the dominant platform for deploying real time and multimedia services. This evolution has had as a consequence th...
A Group Key Agreement protocol is a process to establish a cryptographic key for a group of participants over an open network. In this paper, we propose a group key agreement(CAGKA...
— In this paper we use an information flow model for placement of traffic sinks in a wireless sensor network. Our mathematical model translates a communication network composed...
— We consider a MIMO line of sight (LOS) broadcast channel where each user has perfect knowledge of its own channel and feeds back ‘quantized’ channel information to the tran...