The statistical characteristics of network traffic - in particular the observation that it can exhibit long range dependence - have received considerable attention from the resear...
Daniel R. Figueiredo, Benyuan Liu, Vishal Misra, D...
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
—The success of future P2P applications ultimately depends on whether users will contribute their bandwidth, CPU and storage resources to a larger community. In this paper, we pr...
Zhengye Liu, Hao Hu, Yong Liu, Keith W. Ross, Yao ...
—The advent of practical rateless codes enables implementation of highly efficient packet-level forward error correction (FEC) strategies for reliable data broadcasting in loss-...
: Semiparametric linear transformation models have received much attention due to its high flexibility in modeling survival data. A useful estimating equation procedure was recent...