We analyze the performance of a DHT-based P2P overlay network in resource access and overlay maintenance activities. We use a cross-platform implementation of the protocol called P...
We study the transmission strategy for a system consisting of two pairs of two-way communication links. The information exchange between the two nodes in each pair can only occur w...
Splitting a P2P video distribution in multiple media flows with different priorities is an interesting approach for developing flexible and adaptive streaming systems, ranging from...
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Existing studies on the design of routing protocols for wireless ad hoc networks mainly focused on energy efficiency. However, in many real-time applications such as target trackin...
The design of crosstalk mitigation techniques for DSL broadband access systems has mainly focused on physical layer transmit rate maximization. However, for certain applications, u...
Beier Li, Paschalis Tsiaflakis, Marc Moonen, Joche...
IEEE 802.15.4 multi-hop wireless networks are an important communication infrastructure for many applications, including industrial control, home automation, and smart grids. Exist...
Piergiuseppe Di Marco, Pan Gun Park, Carlo Fischio...
We investigate flow rate optimization on a wireless link with randomly varying channel gain using techniques from adaptive modulation and network utility maximization. We consider ...
Although time-domain oversampling of the received baseband signal is common for single-carrier transmissions, the counterpart of frequency-domain oversampling is rarely used for mu...
Zhaohui Wang, Shengli Zhou, Georgios B. Giannakis,...