Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without upper layer data encryption. However, they are hampered by wireless channel c...
Lun Dong, Zhu Han, Athina P. Petropulu, H. Vincent...
Most cluster systems used in high performance computing do not allow process relocation at run-time. Finding an allocation that results in minimal completion time is NP-hard and (n...
— This paper addresses the performance evaluation of multi-carrier code division multiple access systems both at physical and TCP levels. A partial equalization technique improvi...
Giacomo Leonardi, Barbara M. Masini, Alessandro Ba...
Operating system memory managers fail to consider the population of read versus write pages in the buffer pool or outstanding I/O requests when writing dirty pages to disk or netw...
Alexandros Batsakis, Randal C. Burns, Arkady Kanev...