Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
— This paper presents an asynchronous particle filter algorithm for mobile robot position tracking, taking into account time considerations when integrating observations being d...
Andreu Corominas Murtra, Josep Maria Mirats i Tur,...
Recent advances in wireless communication along with Peer-to-peer (P2P) paradigm have led to increasing interest in P2P mobile ad hoc networks. In this paper, we assume an environ...
3rd Generation Partnership Project's (3GPP) Long Term Evolution (LTE) is focused on enhancing the Universal Terrestrial Radio Access (UTRA). Evolved-Multimedia Broadcast and M...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
We propose a new link metric called normalized advance (NADV) for geographic routing in multihop wireless networks. NADV selects neighbors with the optimal trade-off between proxi...
Seungjoon Lee, Bobby Bhattacharjee, Suman Banerjee