While research on cross-layer network optimization has been progressing, useful implementations have been lagging because the current Internet architecture does not accommodate cro...
Ilia Baldine, Manoj Vellala, Anjing Wang, George N...
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
In this paper, we consider the optimal rate and power allocation that maximizes a general utility function of average user rates in a fading multiple-access or broadcast channel. B...
In this paper, a hybrid sensor network consisting of static and mobile sensors is considered, where static sensors are used to detect events, and mobile sensors can move to event l...
Abstract--The growth rate of the weight distribution of irregular doubly-generalized LDPC (D-GLDPC) codes is developed and in the process, a new efficient numerical technique for i...
Mark F. Flanagan, Enrico Paolini, Marco Chiani, Ma...