Abstract— In Multiple-Input Multiple-Output (MIMO) wireless systems, since different signals are transmitted by different antennas simultaneously, interference occurs between the...
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
— This paper proposes low-complexity blind detection for orthogonal frequency division multiplexing (OFDM) systems with the differential space-time block code (DSTBC) under time-...
—In our previous work [11], we derived detection delay and detection probability for a randomized scheduling algorithm in wireless sensor networks. In this paper, we study asympt...
— WLAN VoIP capacity is known to be very low due to the effects of overheads at various protocol layers. An IEEE 802.11b access point (AP) operating at 11 Mbps for example, can s...
— An exact closed-form expression is derived for the average bit-error probability (BEP) of binary phase-shift keying signals with multiple-antenna reception. We consider maximal...
— In mobile ad hoc networks (MANETs), packets hop from a source to a series of forwarding nodes until they reach the desired destination. Defining the hop length to be the dista...
—In this paper the Cramér-Rao lower bound (CRLB) of an ultra-wideband (UWB) pulse amplitude modulated (PAM) signal with time hopping (TH) code is derived for the practical case ...
—Call holding times in telephony networks are commonly approximated by exponential distributions to facilitate traffic engineering. However, for traffic engineering of cellular n...