—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
—This work presents a methodology for designing CMOS low-voltage low-power low-noise amplifiers (LNAs) based on the inductively degenerated common-source topology. To demonstrate...
Feature extraction and classification are two important components in pattern recognition. In this paper, we propose dynamic target classification in WSNs. The main idea of this a...
Wireless networking and group communication in combination allows groups of dispersed mobile users to collaborate. This paper presents AGENT, a medium access control (MAC) protocol...
Abstract— Understanding user mobility is critical for simulations of mobile devices in a wireless network, but current mobility models often do not reflect real user movements. ...