We consider a class of restless multi-armed bandit problems that arises in multi-channel opportunistic communications, where channels are modeled as independent and stochastically...
Wireless sensor applications (WSNs) are often required to simultaneously satisfy conflicting operational objectives (e.g., latency and power consumption). Based on an observation...
Information dissemination is of vital importance in today's information-centric world. However, controlling the flow of information across multiple security domains is a probl...
— We put forth a unified framework for downlink and uplink scheduling of multiple connections with diverse qualityof-service requirements, where each connection transmits using ...
Abstract. This contribution gives an overview of various access control strategies in use in contemporary healthcare scenarios and shows how a broad variety of respective policies ...