Sensor networks are emerging wireless technologies; their integration with the existing 2.5G, 3G mobile networks is a key issue to provide advanced services, e.g., health control....
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
We propose a distributed on-demand power-management protocol for collecting data in sensor networks. The protocol aims to reduce power consumption while supporting fluctuating dem...
Abstract--Vandermonde-subspace frequency division multiplexing (VFDM) is a technique for interference cancellation in overlay networks that allows a secondary network to operate si...
Leonardo S. Cardoso, Francisco Rodrigo P. Cavalcan...
Reusable libraries are problematic for real-time software in Java. Using Java’s standard class library, for example, demands meticulous coding and testing to avoid response time...
Trevor Harmon, Martin Schoeberl, Raimund Kirner, R...