— In this paper, theoretical results are presented on the modular construction of tree and cascade encoders/decoders of any size for truly asynchronous and orthogonal spectral am...
Bas Huiszoon, Laurens Bakker, Huug de Waardt, Giok...
—In a previous paper [4], we described an approach to improve the performance of the M/M/2 system by replacing its homogeneous servers with heterogeneous servers. Denoting by β ...
— This paper analyzes the performance of a system architecture for the Authentication, Authorization, and Accounting (AAA), in a scenario where 3G users generate traffic and invo...
—The SIP servlet standard is a popular Java application programming interface (API) for developing and deploying Session Initiation Protocol (SIP) applications in Voice over IP (...
— We consider energy efficient network coding design in wireless networks with multiple unicast sessions. Our approach decomposes multiple unicast sessions into a superposition ...
— We propose a rigorous mathematical interpretation of a novel family of Active Queue Management schemes, called Sending Rate Estimate based Queue Management (SREQM) scheme, that...
Venkatesh Ramaswamy, Leticia Cuellar, Stephan Eide...
Abstract— Application Level Gateways and firewalls are commonly used to enforce security policies at network boundaries, especially in large-sized business networks. However, se...
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, ...
—Ad hoc networks employ a decentralized unstructured networking model that relies on node cooperation for key network functionalities such as routing and medium access. In this p...
M. Tamer Refaei, Yanxia Rong, Luiz A. DaSilva, Hye...
— In this paper, we study how to appropriately match users for two-user cooperative diversity systems that deploy optimal power allocation for an amplify and forward or a regener...
Veluppillai Mahinthan, Lin Cai, Jon W. Mark, Xuemi...