Search
Now showing items 141-150 of 183
Impact of channel estimation error on bidirectional MABC-AF relaying with asymmetric traffic requirements
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Article)
Channel estimation error results in severe performance deterioration in wireless networks. In this paper, we study the impact of imperfect channel estimation (ICE) on the outage performance of bidirectional relaying where ...
Cloud of things for sensing as a service: sensing resource discovery and virtualization
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
We propose Cloud of Things for Sensing as a Service: a global architecture that scales up cloud computing by exploiting the global sensing resources of the highly dynamic and growing Internet of Things (IoT) to enable ...
Carrier aggregation for LTE-advanced: Uplink multiple access and transmission enhancement features
(2013 , Article)
Multiple access and transmission enhancement in support of carrier aggregation techniques has been actively studied in the 3GPP LTEAdvanced standardization process of the nextgeneration mobile broadband communication ...
An enhanced public key infrastructure to secure smart grid wireless communication networks
(2014 , Article)
It is expected that the smart grid will radically add new functionalities to legacy electrical power systems. However, we believe that this will in turn introduce many new security risks. With the smart grid's backbone ...
A measurement study on the topologies of BitTorrent networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Article)
BitTorrent (BT) is a widely-used peer-to-peer (P2P) application. Most of BT's characteristics (except the topology) have been studied extensively by measurement approaches. In this paper, we deploy a measurement system to ...
Copy limited flooding over opportunistic networks
(2013 , Conference Paper)
Mobile devices with local wireless interfaces can be organized into opportunistic networks which exploit communication opportunities arising from the movement of their users. With the proliferation and increasing capabilities ...
DVF-fog: Distributed virtual firewall in fog computing based on risk analysis
(
Inderscience Publishers
, 2019 , Article)
To eliminate network saturation during data exchanges, fog computing is deployed as the technology that benefits from both cloud computing and internet of things (IoT) paradigms. Therefore, we focus on network access control ...
Bringing Deep Learning at the Edge of Information-Centric Internet of Things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Various Internet solutions take their power processing and analysis from cloud computing services. Internet of Things (IoT) applications started discovering the benefits of computing, processing, and analysis on the device ...
ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs
(
IEEE Computer Society
, 2015 , Article)
In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be protected from the misuse of their ...
Millimeter-wave multimedia communications: Challenges, methodology, and applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
The worldwide opening of a massive amount of unlicensed millimeter-wave spectrum has triggered great interest in developing high-bit-rate multimedia services and applications. Specific challenges for mmWave communication ...