This paper investigates how to characterize the effect of multiple spectrum handoff delay on the extended data delivery time of the secondary users' connections in cognitive r...
Multi-string matching is a key technique for implementing network security applications like Network Intrusion Detection Systems (NIDS) and anti-virus scanners. Existing DFA-based ...
Yi Tang, Junchen Jiang, Xiaofei Wang, Bin Liu, Yan...
Abstract--Regular expression (Regex) becomes the standard signature language for security and application detection. Deterministic finite automata (DFAs) are widely used to perform...
Yi Tang, Junchen Jiang, Xiaofei Wang, Yi Wang, Bin...
Although time-domain oversampling of the received baseband signal is common for single-carrier transmissions, the counterpart of frequency-domain oversampling is rarely used for mu...
Zhaohui Wang, Shengli Zhou, Georgios B. Giannakis,...
We investigate flow rate optimization on a wireless link with randomly varying channel gain using techniques from adaptive modulation and network utility maximization. We consider ...