Abstract—We study a problem of broadcasting confidential messages to multiple receivers under an information-theoretic secrecy constraint. Two scenarios are considered: 1) all r...
Ashish Khisti, Aslan Tchamkerten, Gregory W. Worne...
Abstract-- Creating high quality network trace files is a difficult task to accomplish on a limited budget. High network speeds may overburden an individual system running packet l...
Chad D. Mano, Jeff Smith, Bill Bordogna, Andrew Ma...
— Multiple-Input Multiple-Output (MIMO) systems are composed of source and destination nodes with multiple antennas. But, when nodes cannot support multiple antennas due to size ...
In mobile wireless networks, dynamic allocation of resources such as transmit powers, bit-rates, and antenna beams based on the channel state information of mobile users is known t...
This paper proposes an algorithm that drives a unicycle type robot to a desired path, including obstacle avoidance capabilities. The path-following control design relies on Lyapun...