Integrating virtual human's animation in networked virtual environments (NVEs) has the potential to create severe network load issues. In NVEs, users are represented by their...
Tolga K. Capin, Maja Jovovic, Joaquim Esmerado, Am...
Abstract—In this contribution we present a decentralized power allocation algorithm for the uplink interleave division multiple access (IDMA) channel. Within the proposed optimal...
Samir Medina Perlaza, Laura Cottatellucci, M&eacut...
The ability to simulate a seaport environment, including illicit cargo and the sensors designed to detect such cargo, allows the evaluation of alternative detection methods in orde...
Allen Christiansen, Damian Johnson, Lawrence B. Ho...
Abstract. Even the most well-motivated models of information security have application limitations due to the inherent uncertainties involving risk. This paper exemplifies a formal...
Benjamin Johnson, Jens Grossklags, Nicolas Christi...
We present Cross-layer Unicast Transmission Time (X-UTT), a MAC-aware load-independent link cost metric for 802.11based wireless mesh networks. X-UTT utilizes information acquired...
Marianna Carrera, Henrik Lundgren, Theodoros Salon...