— In this paper, we consider the design of synchronization-aware distributed space-time codes, which we denote as diagonal distributed space-time codes (DDSTC), for N relay nodes...
Karim G. Seddik, Ahmed K. Sadek, Ahmed S. Ibrahim,...
—In wireless relay networks, noise at the relays can be correlated possibly due to common interference or noise propagation from preceding hops. In this work we consider a parall...
— Wireless multi-hop, mesh networks are being considered as a candidate to backhaul data traffic from access networks to the wired Internet. These mesh networks are referred to a...
—Distributed denial-of-service attacks (DDoS) pose an immense threat to the Internet. The most studied solution is to let routers probabilistically mark packets with partial path...
— A novel cross-layer call admission control policy is proposed for a general CDMA beamforming system. In contrast to previously proposed call admission control (CAC) policies wh...
Abstract— A Wireless Mesh Network (WMN) is being considered for commercial use in spite of several unaddressed issues. In this paper we focus on one of the most critical issues: ...
—Network coordinates (NC) system is an efficient mechanism for Internet distance prediction with limited measurements. In this paper, we identify the intrinsical cause for the i...
Yang Chen, Yongqiang Xiong, Xiaohui Shi, Beixing D...
—In this paper, we study precise localization using Angle of Arrival (AOA) estimations by smart-antenna equipped beacons in Ad-Hoc networks. The node to be localized sends a sign...
— A geometric decoding technique for finite lattices was presented by Seethaler et al. for flat-fading multiple-input multiple-output channels in the case of linear modulations...
— In Wireless Sensor Networks (WSNs), symmetric key schemes may be used to provide security. Recently, a class of random key pre-distribution techniques have been proposed and in...