—A practical protocol jointly considering PHY and MAC for MIMO based concurrent transmissions in wireless ad hoc networks, called Contrabass, is presented. Concurrent transmissio...
Sungro Yoon, Injong Rhee, Bang Chul Jung, Babak Da...
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) righ...
Abstract—RFID promises to revolutionize the inventory management in large warehouses, retail stores, hospitals, transportation systems, etc. Periodically reading the IDs of the t...
While the canonical behavior of today’s home Internet users involves several residents concurrently executing diverse Internet applications, the most common home configuration ...
Jon Gretarsson, Feng Li, Mingzhe Li, Ashish Samant...