Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...
Random beamforming, where each node selects a main beam direction without any coordination with other nodes, has been proposed as a simple technique to improve connectivity in wire...
—While pure web-based services and P2P technologies are popular for personal and social networking, they both have inherent limitations. A hybrid P2P/Infrastrucutre approach coul...
—Recent information theoretic results on cooperation in cellular systems are reviewed, addressing both multicell processing (cooperation among base stations) and relaying (cooper...
—Proportional fair scheduling (PFS) provides good balance between throughput and fairness via multi-user diversity and game-theoretic equilibrium. Very little analytical work exi...
— In receivers, IQ imbalances have significant effects on the performance of data transmission. Comparison of the performance of different types of Orthogonal Space-Time Block Co...
—This review article explores the notion of radio flexibility, its various versions (as presented in a brief taxonomy) and its efficient instantiations under various metrics, pri...