In this paper we consider a cooperative network that is trying to reach binary consensus over fading channels. We first characterize the impact of fading on network consensus by up...
: Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of fa...
An analytical framework for performance analysis and optimization of coded V-BLAST is developed. Average power and/or rate allocations to minimize the outage probability as well as...
Intense competition in many industries impels firms to develop more products in less time. Overlapping of development activities is regarded as one of the most promising strategie...
Jun Lin, Kah Hin Chai, Yoke San Wong, Aarnout Brom...
This work studies optimal sensor placement and motion coordination strategies for mobile sensor networks. For a target tracking application with range sensors, we investigate the ...