—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
—In this paper, we present an application of the Extended Kalman Filter for the on-line estimation of a dynamical carrier phase offset. The novel approach implies deriving the ...
—Random walk (RW) has been widely used as a strategy for searching in peer-to-peer networks. The boom of social network applications introduces new impact to the classical algori...
—Routing in ad-hoc networks can consume considerable amount of battery power. However, as the nodes in these networks have limited power, routing is very much energy-constrained....
Sanjay Kumar Dhurandher, Sudip Misra, Mohammad S. ...
—This paper proposes a method to improve the robustness of the carrier sense system for Opportunistic MAC (OMAC). This carrier sense method is specific for MIMO and the new vers...
Emanuele Coviello, Abhijeet Bhorkar, Francesco Ros...
Abstract—In this paper, we propose a training-based channel estimation scheme for large non-orthogonal space-time block coded (STBC) MIMO systems. The proposed scheme employs a b...
Ahmed Zaki, Saif K. Mohammed, Ananthanarayanan Cho...
—We consider a multi-access two-way relay network where multiple pairs of users exchange information with their pre-assigned partners with the assistance of an intermediate relay...
—Several measurement studies have found a large amount of underutilized radio spectrum. More flexible regulation employing dynamic spectrum access (DSA) has been proposed as sol...
—We consider data networks in which real-time/near real-time applications require not only successful transmission of packets from source to destination, but also specific end-to...