Abstract—Network Intrusion Detection and Prevention Systems (NIDPSs) are vital in the fight against network intrusions. NIDPSs search for certain malicious content in network tr...
N. Sertac Artan, Rajdip Ghosh, Yanchuan Guo, H. Jo...
Abstract— We study transmission schemes for lifetime maximization in wireless sensor networks. Specifically we consider the network where all the sensors observe uncorrelated si...
— A lightweight radio frequency identification (RFID) tag-reader mutual authentication scheme was recently proposed as an improvement over the original authentication protocol s...
— This paper explores relay selection and selection diversity for coded cooperation in wireless sensor networks, with complexity constraints for the sensor nodes. In previous wor...
Josephine P. K. Chu, Raviraj S. Adve, Andrew W. Ec...
— This paper presents a novel stochastic link-layer channel model for IEEE 802.11 ad hoc networks. The model characterizes the variations of the channel service process in a non-...
Abstract— This paper presents a design criteria for arbitrarily low-rate parallel concatenated convolutional codes (PCCCs). The purpose of this work is to find a family of turbo...
Miguel Griot, Andres I. Vila Casado, Richard D. We...
Abstract— We derive a lower bound on the diversitymultiplexing tradeoff for multiple antenna multiple access channels using temporal power control (PC). We quantify the substanti...
— In this paper, we study a wireless multiple-input multiple-output system in a Rayleigh flat-fading environment with correlation among the transmit antennas. We assume that the...
—Packet classification is an enabling function in Internet routers for a variety of Internet applications. In order to classify Internet packets into flows, Internet routers must...