A survey on QoE-oriented wireless resources scheduling

I Sousa, MP Queluz, A Rodrigues - Journal of Network and Computer …, 2020 - Elsevier
Future wireless systems are expected to provide a wide range of services to more and more
users. Advanced scheduling strategies thus arise not only to perform efficient radio resource …

Analysis and design of adders for approximate computing

S Dutt, S Nandi, G Trivedi - ACM Transactions on Embedded Computing …, 2017 - dl.acm.org
The concept of approximate computing, that is, to sacrifice computation quality for
computation efforts, has recently emerged as a promising design approach. Over the past …

Combined reactive-geographic routing for unmanned aeronautical ad-hoc networks

R Shirani, M St-Hilaire, T Kunz, Y Zhou… - 2012 8th …, 2012 - ieeexplore.ieee.org
As a result of high mobility of Unmanned Aerial Vehicles (UAVs), designing a good routing
protocol is challenging for Unmanned Aeronautical Ad-hoc Networks (UAANETs) …

Symmetric 2-D-memory access to multidimensional data

S George, X Li, MJ Liao, K Ma… - … Transactions on Very …, 2018 - ieeexplore.ieee.org
In this paper, we propose a novel memory architecture with the capability of single-cycle row-
wise/column-wise accesses. Such an architecture is highly suitable for workloads featuring …

Deterministic and authenticated flow marking for IP traceback

VA Foroushani… - 2013 IEEE 27th …, 2013 - ieeexplore.ieee.org
In this paper, we present a novel approach to IP trace back-Deterministic Flow Marking
(DFM)-which allows the victim to trace back the origin of incorrect or spoofed source …

Improving routing in networks of Unmanned Aerial Vehicles: Reactive‐Greedy‐Reactive

Y Li, R Shirani, M St‐Hilaire… - … and Mobile Computing, 2012 - Wiley Online Library
Because of their specific characteristics, Unmanned Aeronautical Ad‐hoc Networks
(UAANETs) can be classified as a special kind of mobile ad hoc networks. Because of the …

[HTML][HTML] IP traceback through (authenticated) deterministic flow marking: an empirical evaluation

V Aghaei-Foroushani, AN Zincir-Heywood - EURASIP Journal on …, 2013 - Springer
In this paper, we present a novel approach to IP traceback-deterministic flow marking (DFM).
We evaluate this novel approach against two well-known IP traceback schemes. These are …

A survey of evaluation platforms for ad hoc routing protocols: A resilience perspective

J Friginal, D de Andrés, JC Ruiz, M Martínez - Computer Networks, 2014 - Elsevier
Routing protocols allow for the spontaneous formation of wireless multi-hop networks
without dedicated infrastructure, also known as ad hoc networks. Despite significant …

If you can't beat'em, join'em cooperative and non-cooperative games in network sharing

F Offergelt, F Berkers, G Hendrix - 2011 15th International …, 2011 - ieeexplore.ieee.org
No Mobile Network Operator (MNO) will make the decision to share its network lightly. There
are many financial and strategic considerations to this question. In this paper we outline a …

To share or not to share?

F Berkers, G Hendrix, I Chatzicharistou… - … on Intelligence in …, 2010 - ieeexplore.ieee.org
Radio spectrum and network infrastructure are two essential resources for mobile service
delivery, which are both costly and increasingly scarce. In this paper we consider drivers …