In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name orac...
In this paper, we study instances of complex neural networks, i.e. neural networks with complex topologies. We use Self-Organizing Map neural networks whose neighborhood relations...
The objective of this paper is to emphasize a clear and natural distinction in strategies of sensor network design. In order to display different architectural paradigms in today...
Recently, there is an increasing interest in the deployment of femto access points (FAPs), which are short-range low-power home basestations, over a macro cellular network to impr...
Wang Chi Cheung, Tony Q. S. Quek, Marios Kountouri...
Interference from other users limits the capacity, and possibly the connectivity, of wireless networks. A simple model of a wireless ad-hoc network, in which node locations are des...