—When constructing an unstructured P2P topology, one should consider the application running on top of it in order to achieve a good performance for the whole P2P system. It is n...
— We consider a point-to-multipoint cognitive radio network that shares a set of channels with a primary network. Within the cognitive radio network, a base station (BS) controls...
— This paper analyzes some critical security issues in the family of IEEE 802.16 standard that has not been addressed so far. In particular two of the key features of the standar...
— We propose a new internetworking architecture that represents a departure from current philosophy and practice, as a contribution to the ongoing debate regarding the future Int...
Rudra Dutta, George N. Rouskas, Ilia Baldine, Arno...
Abstract— Optical Burst and Packet Switching are being considered as the most promising paradigms to increase bandwidth efficiency in IP over DWDM networks. In both cases, due t...
— In this paper an original detection strategy for satellite digital broadcasting communications is defined; particularly, we consider the DVB-S2 system, which is proposed as a ...
Simone Morosi, Romano Fantacci, Enrico Del Re, Ros...
— In orthogonal frequency-division multiplex access (OFDMA) systems, including uplink and downlink, the carrierfrequency offset (CFO) between the multiple transceivers introduces...
Min Huang, Ming Zhao 0001, Shidong Zhou, Jing Wang...
― In this paper, a modified bit-flipping decoding algorithm for low-density parity-check (LDPC) codes is proposed. Both improvement in performance and reduction in decoding delay...
— In this paper we describe a time-based admission control scheme for Multimedia over IP services in wireless LANs based on the IEEE 802.11e standard. We build on an existing wor...
Rosario Giuseppe Garroppo, Luca Tavanti, Stefano L...