Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2019
Exploiting interactions among signals to decode interfering transmissions with fewer receiving antennas
Computer Communications (COMS), Volume 136, Issue CPages 63–75https://doi.org/10.1016/j.comcom.2018.12.008AbstractDue to the hierarchical structure and heterogeneity of most deployed wireless networks, multiple data transmissions using the same communication resource, such as same frequency band and time slot, are likely to occur in the same area. ...
- articleOctober 2018
A secure wireless mission critical networking system for unmanned aerial vehicle communications
Telecommunications Systems (TESY), Volume 69, Issue 2Pages 237–251https://doi.org/10.1007/s11235-018-0460-2A privacy-preserving secure communication in ad hoc (without infrastructure) mission critical wireless networking system suitable for unmanned aerial vehicle communication systems is introduced and analyzed. It is expected that in a critical condition, ...
- ArticleApril 2016
The Interpretation of Landscape
SMARTGREENS 2016: Proceedings of the 5th International Conference on Smart Cities and Green ICT SystemsPages 111–116https://doi.org/10.5220/0005907601110116In recent years we have seen a gradually increasing concern for the urban landscape and the way it is designed and evaluated. This concern, a result of the emergence of digital technologies and convergence of different scientific disciplines, is based ...
- research-articleSeptember 2015
Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 12, Issue 5Pages 585–596https://doi.org/10.1109/TDSC.2014.2366455Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the contested transmission medium. Recent works investigate physical layer features such as received signal strength or radio frequency fingerprints to localize ...
- articleApril 2015
A 90-GHz receiver in 40-nm CMOS for plastic waveguide links
Analog Integrated Circuits and Signal Processing (KLU-ALOG), Volume 83, Issue 1Pages 55–64https://doi.org/10.1007/s10470-015-0510-6Plastic waveguide links are proposed as a cost-friendly, light-weight and EMI-robust alternative for copper and optical interconnects for Gbps data transfer up to 10 m. Measured properties of the rectangular polypropylene waveguide such as dielectric ...
-
- articleJuly 2014
A 60 GHz receiver front-end with PLL based phase controlled LO generation for phased-arrays
Analog Integrated Circuits and Signal Processing (KLU-ALOG), Volume 80, Issue 1Pages 23–32https://doi.org/10.1007/s10470-014-0301-5This paper presents a front-end architecture for fully integrated 60 GHz phased array receivers. It employs LO-path beamforming using a phase controlled phase-locked loop (PC-PLL). To demonstrate the architecture a circuit is implemented featuring a two ...
- ArticleApril 2014
Energy-efficient communication system based on nonlinear scattering of standard OFDM signals
FRUCT'15: Proceedings of the 15th Conference of Open Innovations Association FRUCTPages 39–45https://doi.org/10.1109/FRUCT.2014.6872426Development of miniaturized communication systems for exchanging data over short distances with little power consumption is an actual problem. This problem is solved by such standards as Bluetooth, ZigBee etc. Nowadays for extra size devices with power ...
- ArticleDecember 2013
Analyzing Coexistence Issues in Wireless Radio Networks: Simulation of Bluetooth Interfered by Multiple WLANs
MACOM 2013: Proceedings of the 6th International Workshop on Multiple Access Communcations - Volume 8310Pages 128–138https://doi.org/10.1007/978-3-319-03871-1_12In many fields of technology more mobile transmission paths will be used in the future. In order to ensure a secure transmission of data, studies for coexistence of the used radio technologies with other currently wide used radio systems (WLAN, ...
- research-articleNovember 2013
Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 24, Issue 11Pages 2171–2180https://doi.org/10.1109/TPDS.2012.61Smart grid uses intelligent transmission and distribution networks to deliver electricity. It aims to improve the electric system's reliability, security, and efficiency through two-way communication of consumption data and dynamic optimization of ...
- research-articleNovember 2013
On the Multicast Capacity in Energy-Constrained Lossy Wireless Networks by Exploiting Intrabatch and Interbatch Network Coding
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 24, Issue 11Pages 2251–2260https://doi.org/10.1109/TPDS.2012.325We study a fundamental problem in determining the multicast capacity in energy-constrained wireless networks with lossy transmission links. The multicast capacity in our paper is defined as the maximum number of packets that can be disseminated from the ...
- research-articleNovember 2013
Aggregation Latency-Energy Tradeoff in Wireless Sensor Networks with Successive Interference Cancellation
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 24, Issue 11Pages 2160–2170https://doi.org/10.1109/TPDS.2012.314Minimizing latency and energy consumption is the prime objective of the design of data aggregation in battery-powered wireless networks. A tradeoff exists between the aggregation latency and the energy consumption, which has been widely studied under ...
- research-articleNovember 2013
Esense: Energy Sensing-Based Cross-Technology Communication
IEEE Transactions on Mobile Computing (ITMV), Volume 12, Issue 11Pages 2303–2316https://doi.org/10.1109/TMC.2012.195In this paper, we present Esense, a new paradigm of communication between devices that have fundamentally different physical layers. Esense is based on sensing and interpreting energy profiles. While our ideas are generic enough to be applicable in a ...
- research-articleNovember 2013
CMT-QA: Quality-Aware Adaptive Concurrent Multipath Data Transfer in Heterogeneous Wireless Networks
IEEE Transactions on Mobile Computing (ITMV), Volume 12, Issue 11Pages 2193–2205https://doi.org/10.1109/TMC.2012.189Mobile devices equipped with multiple network interfaces can increase their throughput by making use of parallel transmissions over multiple paths and bandwidth aggregation, enabled by the stream control transport protocol (SCTP). However, the different ...
- research-articleNovember 2013
Joint Routing and Scheduling in WMNs with Variable-Width Spectrum Allocation
IEEE Transactions on Mobile Computing (ITMV), Volume 12, Issue 11Pages 2178–2192https://doi.org/10.1109/TMC.2012.187This paper addresses, in the context of wireless network design, the problem of optimally partitioning the spectrum into a set of nonoverlapping channels with nonuniform spectrum widths. While narrower bands split the total available spectrum into more ...
- research-articleNovember 2013
Practical Ensemble Classification Error Bounds for Different Operating Points
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 25, Issue 11Pages 2590–2601https://doi.org/10.1109/TKDE.2012.219Classification algorithms used to support the decisions of human analysts are often used in settings in which zero-one loss is not the appropriate indication of performance. The zero-one loss corresponds to the operating point with equal costs for false ...
- research-articleNovember 2013
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
IEEE Transactions on Computers (ITCO), Volume 62, Issue 11Pages 2266–2277https://doi.org/10.1109/TC.2012.215Public-key encryption with keyword search (PEKS) is a versatile tool. It allows a third party knowing the search trapdoor of a keyword to search encrypted documents containing that keyword without decrypting the documents or knowing the keyword. However,...
- research-articleNovember 2013
Receiving Buffer Adaptation for High-Speed Data Transfer
IEEE Transactions on Computers (ITCO), Volume 62, Issue 11Pages 2278–2291https://doi.org/10.1109/TC.2012.109New applications based on cloud computing, such as data synchronization for large chain departmental stores and bank transaction records, require very high-speed data transport. Although a number of high-bandwidth networks have been built, existing ...
- articleOctober 2013
TDoA for Passive Localization: Underwater versus Terrestrial Environment
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 24, Issue 10Pages 2100–2108https://doi.org/10.1109/TPDS.2012.310The measurement of an emitter's position using electronic support passive sensors is termed passive localization and plays an important part both in electronic support and electronic attack. The emitting target could be in terrestrial or underwater ...
- articleOctober 2013
Novel Branching-Router-Based Multicast Routing Protocol with Mobility Support
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 24, Issue 10Pages 2060–2068https://doi.org/10.1109/TPDS.2012.305To cope with challenging problems faced by traditional multicast routing protocols, many branching-router (BR)-based multicast routing schemes with desirable features have been proposed. However, the current BR-based methods still lack efficient ...
- articleOctober 2013
mPath: High-Bandwidth Data Transfers with Massively Multipath Source Routing
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 24, Issue 10Pages 2046–2059https://doi.org/10.1109/TPDS.2012.298The capacity of access links has increased dramatically in recent times, and bottlenecks are moving deeper into the Internet core. When bottlenecks occur in a core (or AS-AS peering) link, it is possible to use additional detour paths to improve the end-...