The propagation characteristics of electromagnetic (EM) waves in tunnels are significantly different from those in terrestrial environment. However, the current tunnel channel mode...
In this paper, we examine one of the security issues in vehicular ad-hoc network (VANETs): position-spoofing attack. We propose a novel Secure Location Verification (SLV) scheme to...
Joo-Han Song, Victor W. S. Wong, Vincent C. M. Leu...
In this paper, we investigate upper and lower bounds on the capacity of two-user fading broadcast channels where one of the users has a constant (non-fading) channel. We use the Co...
We propose a broadcast protocol that is based on a form of cooperative diversity called the Opportunistic Large Array (OLA). In the initial broadcast, an SNR ("transmission&qu...
It has been shown that network coding can lead to significant improvement in network capacity and reduction in power consumption for multicast traffic in wireless networks. In this...
WiFi, i.e., IEEE 802.11 is one of the most widely used technologies to implement internet access in today's networks. Typical frame error rates in IEEE 802.11 are much higher ...
Ayyappan Ravichandran, Marco Tacca, Michael Welzl,...
Abstract-- We study the problem of total throughput maximization in arbitrary multi-hop wireless networks, with constraints on the total power usage (denoted by PETM), when nodes h...
Deepti Chafekar, V. S. Anil Kumar, Madhav V. Marat...
Abstract--Energy efficiency is becoming increasingly important for small form factor mobile devices, as battery technology has not kept up with the growing requirements stemming fr...
Selection cooperation is proposed for rateless coded relaying by developing a novel low-complexity protocol that exploits all source-destination, source-relay, and relay-destinatio...
In this paper, we first provide a joint source and channel coding (JSCC) approach in estimating Gaussian sources over Gaussian MAC channels, as well as its sufficient and necessary...
Shuangqing Wei, Rajgopal Kannan, S. Sitharama Iyen...