—This paper presents a mathematical framework for resource reservation in TCP/IP networks by invoking a dynamic system viewpoint on the congestion monitoring processes occurring ...
—Network Intrusion Detection Systems (NIDS) are more and more important in today’s network security for identifying and preventing malicious attacks over the network. This pape...
— This paper addresses the performance evaluation of multi-carrier code division multiple access systems both at physical and TCP levels. A partial equalization technique improvi...
Giacomo Leonardi, Barbara M. Masini, Alessandro Ba...
— In wireless networks, the use of collaboration has been shown to provide an increase in reliability due to an increase in diversity. Specifically it has been shown that by havi...
Patrick Tooher, Hesam Khoshneviss, M. Reza Soleyma...
— Users’ demand of seamless connectivity has pushed for the development of alternatives to traditional infrastructure networks. Potential solutions should be low-cost, easily d...
Abstract - In this paper, we consider downward and upward vertical handovers in integrated wireless LAN and cellular networks, and address Wireless Profiled TCP premature timeouts ...
Abstract— We propose belief propagation (BP) based detection algorithms for the Bell labs layered space-time (BLAST) architectures. We first develop a full complexity BP algorit...
—In this paper, we present a two-pass intra-refresh transcoder for on-the-fly enhancing error resilience of a compressed video in a three-tier streaming system. Furthermore, we c...
—Establishing robust communications in the presence of Doppler rate is a requirement for several waveforms such as SATCOM and HF. In this paper, we motivate the need to model Dop...