—We propose a network-coding based scheme to protect multiple bidirectional unicast connections against adversarial errors and failures in a network. The end nodes of the bidirec...
We consider a dense K user Gaussian interference network formed by paired transmitters and receivers placed independently at random in a fixed spatial region. Under natural condi...
Oliver Johnson, Matthew Aldridge, Robert J. Piecho...
—We consider a scenario where multiple pairs of users exchange information within pair with the help of a dedicated multi-antenna relay. The co-channel interference among multipl...
Chee Yen Leow, Zhiguo Ding, Kin K. Leung, Dennis G...
Abstract—Many important biological problems can be modeled as contagion diffusion processes over interaction networks. This paper shows how the EpiSimdemics interaction-based sim...
Keith R. Bisset, Ashwin M. Aji, Madhav V. Marathe,...
—Several contention-based Medium Access Control (MAC) protocols have been proposed for the vehicles to gain the radio channels to distribute active safety messages timely, e.g., ...