Adapting to the network is the key to achieving high performance for communication-intensive applications, including scientific computing, data intensive computing, and multicast...
This paper proposes a framework for interference mitigation in multi-BSS infrastructure 802.11 WLANs. Our interference mitigation approach is based on Access Point (AP) Coordinati...
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms...
Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof S...
Abstract— To construct an efficient overlay network, the information of underlay is important. However, the inference of an underlay topology is not easy. We consider using end-...
— We demonstrate dynamic power maximization and synchronization of a wireless RF communication link through adaptation of the radiation pattern of a phased array at the transmitt...
Dimitrios N. Loizos, Paul-Peter Sotiriadis, Gert C...