Geographically embedded processes with hidden origins are often observable in events they generate. It is common practice in criminological forensics to reverse simple equation-ba...
— Protection against failure in high bandwidth optical networks can prevent significant potential losses of data but at the same time it requires a considerable fraction of the ...
Amir Askarian, Yuxiang Zhai, Suresh Subramaniam, Y...
In this paper, we consider a deadline constrained traffic and analyze the joint effects of packet queuing and adaptive modulation (AM) for packet transmission in MIMO systems. We p...
— The IEEE 802.11e standard supports a Direct-Link Setup (DLS) mechanism optionally to improve the throughput. Using this mechanism, IEEE 802.11e stations in proximity can direct...
Abstract—Traditional Dijkstra and Bellman-Ford routing algorithms can only provide the best route to each destination based on a fixed link cost model. We propose a utility-base...