Abstract. Problems of secure communication and computation have been studied extensively in network models, for example, Franklin and Yung have studied secure communications in the...
Deployment of wireless sensors in real world environments is often a frustrating experience. The quality of radio links is highly coupled to unpredictable physical environments, l...
Branislav Kusy, Christian Richter, Wen Hu, Mikhail...
—We develop opportunistic scheduling policies for cognitive radio networks that maximize the throughput utility of the secondary (unlicensed) users subject to maximum collision c...
—We address the problem of collaborative sensing in cognitive radios. In a cognitive radio network, all the nodes may sense the spectrum simultaneously. They should then exchange...
Ehsan Azarnasab, Rong-Rong Chen, Koon Hoo Teo, Zhi...
In this paper we propose a new protocol for reliable multicast in a multi-hop mobile radio network. The protocol is reliable, i.e., it guarantees message delivery to all multicast...