• Publications
  • Influence
A Survey of Indoor Localization Systems and Technologies
TLDR
This paper aims to provide a detailed survey of different indoor localization techniques, such as angle of arrival (AoA), time of flight (ToF), return time ofFlight (RTOF), and received signal strength (RSS) based on technologies that have been proposed in the literature. Expand
A resource allocation strategy for distributed MIMO multi-hop communication systems
An extended form of multi-hop communication systems is introduced which allows the application of multiple-input-multiple-output (MIMO) capacity enhancement techniques over spatially separatedExpand
Robust monitor placement for network tomography in dynamic networks
TLDR
This work shows that the optimal (i.e., minimum) monitor placement is the solution to a generalized hitting set problem, where it provides a polynomial-time algorithm to construct the input. Expand
Route Construction for Long Lifetime in VANETs
TLDR
A method is presented that produces a link-lifetime-related metric capable of capturing the remaining time for which a link can be used for efficient communication, and an analytical framework, which quantifies the probability of correctly identifying the longest living link between two given links, based on the estimates. Expand
2-hop distributed MIMO communication system
The concept of multi-hop distributed multiple-input, multiple-output (MIMO) communication scenarios is introduced and analysed for the 2-hop case in terms of capacity benefits over the direct andExpand
Average packet delay of CSMA/CA with finite user population
In this paper, a simple closed form solution for the packet delays of the basic carrier sense multiple access with collision avoidance system is derived. Simulation results confirm the applicabilityExpand
Resource allocation for FDMA-based regenerative multihop links
An approximate but explicit fractional bandwidth and power allocation algorithm for orthogonal regenerative frequency-division multiple-access-based multihop communication systems over ergodicExpand
Link residual-time estimation for VANET cross-layer design
Traditional network design may underestimate the dependencies between different layers of the protocol stack and fail to exploit the direct coupling of physical-layer operations to the networkExpand
iVisher: Real‐Time Detection of Caller ID Spoofing
Voice phishing (vishing) uses social engineering, based on people's trust in telephone services, to trick people into divulging financial data or transferring money to a scammer. In a vishing attack,Expand
A Novel Cross-Layer QoS Routing Algorithm for Wireless Mesh Networks
TLDR
This paper proposes a distributed, multi- constrain, cross-layer QoS routing algorithm for wireless mesh networks that can simultaneous satisfy multiple QoS requirements and achieves higher network throughput when compared with other standard techniques. Expand
...
1
2
3
4
5
...