This paper presents a method for power and ground (p/g) network routing for high speed CMOS chips with multiple p/g pads. Our objective is not to reduce the total amount of the gr...
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
A lifetime of several years for wireless sensor nodes can be achieved if their activity period is minimized. This can be done by using low duty cycle protocols. One of the challeng...
Marcin Brzozowski, Hendrik Salomon, Peter Langendo...
—In recent years, use of sensors to measure the biometrics and movements of human body have resulted in the design of wireless body area networks (WBAN). Although WBANs consist o...
Syed Muhammad Khaliq-ur-rehman Raazi, Heejo Lee, S...
In this paper, designing an effective user relaying algorithm, in terms of relay node selection and power allocation, is discussed for amplify-and-forward wireless relay networks. ...
Jun Cai, Xuemin Shen, Jon W. Mark, Attahiru Sule A...