—We consider a widely applicable model of resource allocation where two sequences of events are coupled: on a continuous time axis (t), network dynamics evolve over time. On a di...
Alexandre Proutiere, Yung Yi, Tian Lan, Mung Chian...
We propose an energy-aware video streaming system for portable computing devices, in which the video can be played back for the specified duration within the remaining battery am...
Morihiko Tamai, Tao Sun, Keiichi Yasumoto, Naoki S...
—Modulation techniques have attracted increasing attention in optical wireless communications. Basic schemes such as on off keying (OOK), pulse amplitude modulation (PAM) and pul...
Yu Zeng, Roger J. Green, Shaobo Sun, Mark S. Leeso...
— Large scale wireless sensor networks (WSNs) can be used for various pervasive and ubiquitous applications such as security, health-care, industry automation, agriculture, envir...
: This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture...