Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
The asymptotic distribution of estimates that are based on a sub-optimal search for the maximum of the log-likelihood function is considered. In particular, estimation schemes that...
Modern wireless interfaces support a physical layer capability called Message in Message (MIM). Briefly, MIM allows a receiver to disengage from an ongoing reception, and engage ...
Justin Manweiler, Naveen Santhapuri, Souvik Sen, R...
—Providing energy-efficient continuous data collection services is of paramount importance to Wireless Sensor Network (WSN) applications. This paper proposes a new power manageme...
Wireless Sensor Network typically assimilates various real time applications that must meet some QoS requirements (e.g. delay, jitter, throughput, packet loss) under severe resourc...
Muhammad Mostafa Monowar, Md. Obaidur Rahman, Byun...