We design opportunistic spectrum access strategies for improving spectrum efficiency. In each slot, a secondary user chooses a subset of channels to sense and decides whether to ac...
The throughput of delay sensitive traffic in a Rayleigh fading network is studied by adopting a scaling limit approach. The case of study is that of a pair of nodes establishing a ...
Wireless sensor networks have been widely used in many surveillance applications. Due to the importance of sensor nodes in such applications, certain level of protection needs to b...
Spatial scheduling in a heterogeneous WiMax Downlink channel, based on partial Channel State Information at the Transmitter (CSIT), is carried out through a multibeam opportunistic...
Zero Configuration Networking (Zeroconf) assigns IP addresses and host names, and discovers service without a central server. Zeroconf can be used in wireless mobile ad-hoc network...
Abstract-- The emerging high-rate wireless personal area network (WPAN) technology is capable of supporting high-speed and high-quality real-time multimedia applications. In partic...
Shahab Moradi, Amir Hamed Mohsenian Rad, Vincent W...
Abstract-- The complementary characteristics of cellular systems and wireless local area networks (WLANs) make them attractive candidates to jointly offer a seamless wireless solut...
Enrique Stevens-Navarro, Amir Hamed Mohsenian Rad,...
Open Shortest Path First (OSPF) is one of the most widely used intra-domain routing protocol. It is well known that OSPF protocol does not provide flexibility in terms of packet fo...
In this paper we first present a model to analyze the average and standard deviation of the delay in a 802.11e EDCA WLAN under voice traffic. Next, based on this model, we compute ...
In this contribution1 , we investigate the idea of using cognitive radio to reuse locally unused spectrum to increase the total system capacity. We consider a multiband/wideband sy...