— This paper describes a combined modulation scheme for time hopping ultra wideband (TH-UWB) radio systems using on-off keying (OOK) and pulse shape modulation (PSM). For this sc...
Sudhan Majhi, A. S. Madhukumar, A. Benjamin Premku...
— This paper studies performance of space-time coded (STC) systems with joint transmit and receive antenna selection over multiple input multiple output (MIMO) flat and frequenc...
Abstract— Wireless topology control is the process of structuring the connectivity between network nodes to achieve some network-wide goal. This paper presents a cognitive networ...
Ryan W. Thomas, Ramakant S. Komali, Allen B. MacKe...
Abstract—In this paper we propose a low complexity frequency domain channel estimator for pilot-symbol-assisted (PSA) orthogonal frequency division multiplexing (OFDM) systems in...
— With the increasing number of wireless devices, the importance of mobility management in future mobile networks is growing. In addition, the number of access technologies avail...
Ramy Farha, Khashayar Khavari, Alberto Leon-Garcia
—The performance evaluation of delay-tolerant CFDP is seen in the literatures. In this work, we focus on experimental performance investigation of the delay-tolerant CFDP in the ...
Ruhai Wang, Prabin Manandhar, Paradesh K. V. Rapet...
— Existing methods for local area service discovery either don’t scale or rely on a trustworthy directory server; in some environments these restrictions are unacceptable or im...
Richard Black, Heimir Sverrisson, Laurent Massouli...
—Pervasive communications are increasingly sent over mobile devices and personal digital assistants. This trend has been observed during the last football world cup where cellula...
Guillaume Jourjon, Emmanuel Lochin, Patrick S&eacu...
— Adaptive Search Radius (ASR) is a peer selection method that can be used in Peer-to-Peer (P2P) file sharing applications, such as eMule or BitTorrent, in order to reduce the g...
— We consider opportunistic spectrum access (OSA) which allows secondary users to identify and exploit instantaneous spectrum opportunities resulting from the bursty traffic of ...