—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Networks of sensors and simulation models of the physical environment have been implemented separately, often using agent-based methodologies. Some work has been done in providing...
Increasingly, 802.11 devices are being used by mobile users. This results in very dynamic wireless channels that are difficult to use efficiently. Current rate selection algorithm...
: Stored map services in mobile devices, such as cellular phones, are being commercialised for the mobile and wireless environment. In order to ensure the quality and accuracy of t...
In this paper a synthetic mobility model which represents behavior and movement pattern of heterogeneous units in disaster relief and battlefield scenarios is proposed. These oper...