Abstract--Interference between nodes directly limits the capacity of mobile ad hoc networks. This paper focuses on spatial interference cancelation with perfect channel state infor...
Kaibin Huang, Jeffrey G. Andrews, Robert W. Heath ...
In performance-driven interconnect design, delay estimators are used to determine both the topology and the layout of good routing trees. We address the class of moment-matching, ...
Abstract—This paper identifies the possibility of using electronic compasses and accelerometers in mobile phones, as a simple and scalable method of localization without war-dri...
Ionut Constandache, Romit Roy Choudhury, Injong Rh...
Resource security pertains to the prevention of unauthorized usage of system resources that may not directly cause corruption or leakage of information. A common breach of resource...
- This paper describes the design and fabrication of a low cost, solar powered mobile robot to support a variety of scientific missions on the Antarctic plateau during the austral ...
Laura E. Ray, Alexander D. Price, Alexander D. Str...