Abstract— Frame synchronization is classically treated in literature for equiprobable data symbols. In this case the optimum metric has been derived both in the case of periodica...
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
—The sampling expansion approach for computing the performance of TR UWB systems has restricted validity and is very inaccurate in some cases. A new analytical method to evaluate...
—Several dynamic call admission control (CAC) schemes for cellular networks have been proposed in the literature to reserve resources adaptively to provide the desired quality of...
In this paper we propose a fundamental approach to perform the class of Nearest Neighbor (NN) queries, the core class of queries used in many of the location-based services, withou...