— In this paper, we introduce a novel Markov Chain (MC) representation aided Minimum Bit Error Rate (MBER) detection method that is applicable to an M-QAM modulated SDM/SDMA upli...
—Wireless ad hoc networks are connected to the fixed Internet by means of Internet gateways. Whenever a node within the ad hoc network wishes to communicate with a host in the I...
—We consider multi-user MIMO broadcast channels with limited feedback. A recently proposed linear precoding technique, regularized block diagonalization (RBD), is used to mitigat...
—We study a sensor node with an energy harvesting source. In any slot, the sensor node is in one of two modes: Wake or Sleep. The generated energy is stored in a buffer. The sens...
—A network with two sources, one relay, and one destination is considered. Under the assumption of noisy sourcerelay links causing the relay to be unable to decode without error,...
Georg Zeitler, Ralf Koetter, Gerhard Bauch, Jö...
—According to several studies, the power consumption of the Internet accounts for up to 10% of the worldwide energy consumption, and several initiatives are being put into place ...
—The Domain Name Service (DNS) provides a critical function in directing Internet traffic. Defending DNS servers from bandwidth attacks is assisted by the ability to effectively...
Relay selection for cooperative communications has attracted considerable research interest recently. While several criteria have been proposed for selecting one or more relays an...
—The IETF working group Next Steps in Signaling (NSIS) develops signaling protocols for Quality-of-Service (QoS) reservations or dynamic NAT and firewall (NAT/FW) configuration...