—The Physical Layer of the IEEE 802.11 standard family provides a set of different modulation and coding schemes and, thus, a multitude of data rates. However, the Standard itsel...
— This paper studies an auction based allocation of network resources for short-term contracts for heterogeneous network services. The combinatorial winner selection yields the o...
—We consider a Delay Tolerant Network (DTN) whose users (nodes) are connected by an underlying Mobile Ad hoc Network (MANET) substrate. Users can declaratively express high-level...
—The Multicanonical Monte Carlo (MMC) technique is a new form of adaptive importance sampling (IS). Thanks to its blind adaptation algorithm, it does not require an in-depth syst...
Alberto Bononi, Leslie A. Rusch, Amirhossein Ghazi...
Abstract—Vehicular Ad-Hoc networks (VANETs) play a critical role in enabling important active safety applications such as collision warning and vehicle tracking. The most pressin...
Ching-Ling Huang, Yaser P. Fallah, Raja Sengupta, ...
— A wireless MIMO link is considered in a LOS configuration with multiple SISO wireless repeaters assisting. A theoretical analysis is presented in which repeater positions are c...
—We consider the Gaussian interference channel with an intermediate relay. The relay is assumed to have abundant power and is named potent for that reason. A main reason to consi...
—In this paper we consider a network of distributed sensors that are trying to measure a parameter of interest cooperatively, by exchanging their acquired information repeatedly ...
—The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for finge...
Abstract—The multimedia communication is rapidly converging towards Voice over Internet – commonly known as Voice over Internet Protocol (VoIP). Session Initiation Protocol (SI...