Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
Abstract. In this paper, we propose a new compact and low delay routing labeling scheme for Unit Disk Graphs (UDGs) which often model wireless ad hoc networks. We show that one can...
Mobile devices became powerful recently and wireless Internet access is becoming standard. One important class of networked, mobile applications are location based games, making e...
— We consider a network setting, where a single Service Provider (SP) provides wireless data services to a group of users in the downlink. The transmission model is similar to OF...
— In this paper, we study the problem of distributed detection in the presence of unknown carrier frequency offset (CFO) and initial phase, the issue we encounter in the emerging...