Abstract. Many real-time applications demand delay guarantees from the network. A network architecture designed to support these applications should be robust and scalable. The Int...
A plethora of single-carrier and multi-carrier (MC) CDMA systems have been proposed recently to mitigate intersymbol interference (ISI) and eliminate multiuser interference (MUI). ...
Georgios B. Giannakis, Anastasios Stamoulis, Zheng...
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of se...
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...