Abstract-- Recovery of traffic in connectionless pure IP networks has traditionally been handled by a full re-convergence of the network state. This process operates in a time scal...
Audun Fosselie Hansen, Olav Lysne, Tarik Cicic, St...
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...
This paper focuses on turbo packet combining techniques for multi-relay-assisted systems operating over multiple-input multiple-output (MIMO) broadband channel. Two packet combini...
A semantic sensor network describes the physical world using the metadata obtained from a sensor network. In this paper, we present our design and implementation of MeT, a real wo...
We investigate the packet-level scheduling for the downlink of multiple-input multiple-output (MIMO) multi-user systems using beamforming. We consider the traffic arrival process ...