—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Abstract. A novel method for estimating a field of orientation distribution functions (ODF) from a given set of DW-MR images is presented. We model the ODF by Cartesian tensor basi...
Yonas T. Weldeselassie, Angelos Barmpoutis, M. Ste...
We propose an opportunistic channel access scheme for cognitive radio-enabled secondary networks. In our work, we model the channel occupancy due to Primary User (PU) activity as a...
Throughput maximization is a key challenge in cognitive radio ad hoc networks, where the availability of local spectrum resources may change from time to time and hopby-hop. To ach...
Lei Ding, Tommaso Melodia, Stella N. Batalama, Joh...
Beamforming and relaying are two methods of improving wireless system performance. Until now, these techniques have been considered separately. In this paper, a single source (base...