—We present a new family of tight lower and upper bounds on the Gaussian Q-function Q(x). It is first shown that, for any x, the integrand ϕ(θ; x) of the Craig representation ...
—At present there is a strong worldwide push toward bringing fiber closer to individual homes and businesses. Another evolutionary step is the cost-effective all-optical integra...
Lehan Meng, Chadi Assi, Martin Maier, Ahmad R. Dha...
—The key idea of dynamic spectrum access (DSA) networks is to allow the secondary, unlicensed users to detect and use unused portions of the spectrum (white spaces) opportunistic...
—Opportunistic Routing (OR) has been considered as one promising technique to overcome the unreliability of the wireless medium by collaborating multiple neighboring receivers/ca...
— In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) net...
— A point-to-point discrete-time scheduling problem of transmitting B information bits within T hard delay deadline slots is considered assuming that the underlying energy-bit co...
— The dynamic composition of systems of networked appliances, or virtual devices, in MANETs, enables users to generate, on-the-fly, complex strong specific systems. Current work ...
—In this paper, the source covariance matrices of multiple-input multiple-output (MIMO) interference channels (IFCs) are investigated from a game-theoretic perspective. It is pro...
Zengmao Chen, Sergiy A. Vorobyov, Cheng-Xiang Wang...
—The changes in the communication paradigm envisioned for future networks, with peer-to-peer/symmetric attachments gaining momentum and two IP (Internet Protocol) versions coexis...
—This study presents a cross-layer fast handover scheme for VANET, called vehicular fast handover scheme (VFHS), where the physical layer information is shared with the MAC layer...