This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Abstract. This paper describes a framework for the design space exploration of resource-efficient software-defined radio architectures. This design space exploration is based on a ...
Thorsten Jungeblut, Ralf Dreesen, Mario Porrmann, ...
Network Coding (NC) has witnessed a tremendous upsurge in interest and activities in recent years, both in academia and industry. Indeed, since the pioneering publication of Ahlswe...
Marco Di Renzo, Lana Iwaza, Michel Kieffer, Pierre...
Advancements in network technologies dramatically increased management complexity. Cognitive networking was introduced to deal with this problem, by providing algorithms for autono...
Dzmitry Kliazovich, Neumar Malheiros, Nelson L. S....
This paper proposes and assesses a new distributed simulation platform for heterogeneous wireless communications. The objective of the ICARUS platform is to investigate cross-layer...
M. Carmen Lucas-Estan, Salva Garrigas, Javier Goz&...
Abstract. A comparison between time and frequency domain TOA estimators compliant with the 802.15.4a Standard has been made. The time domain estimator is done in two stages. One ha...
Abstract. Mobile network operators demand small base station antennas and high physical layer throughputs. In the downlink, high physical layer throughputs can be achieved by explo...