Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received co...
Abstract--Multi-user buffer control is a closed-loop transmission strategy to ensure users buffers do not underflow or overflow. The dynamic scheme requires buffer state informatio...
Vinay R. Majjigi, Daniel O'Neill, Carolin Huppert,...
We present an information theoretic perspective on optimal broadband matching. Most of the broadband matching and communication theory literature assumes a frequencyflat reflection...
There are many key problems of decision making related to spectrum occupancies in cognitive radio networks. It is known that there exist correlations of spectrum occupancies in tim...
In this paper, we examine the operation of a node relaying packets from a number of users to a destination node. We assume that the relay does not have packets of its own, the traf...
Nikolaos Pappas, Apostolos Traganitis, Anthony Eph...