Learn More
Traditional authentication techniques for wireless communications are facing great challenges, due to the open radio propagation environment and limited options of transmission techniques. A new continuous physical layer authentication technique with time-varying transmission parameters is investigated to enhance the security of orthogonal frequency(More)
This paper discusses the joint session scheduling (JOSCH) problem for multimedia services in heterogeneous wireless networks. The adaptive JOSCH based on layer-encoded streaming is designed for real-time multimedia service simultaneously transmitted by several heterogeneous radio access technologies (RATs). Considering the layered characteristics of the(More)
Delaunay meshes (DM) are a special type of triangle mesh where the local Delaunay condition holds everywhere. We present an efficient algorithm to convert an arbitrary manifold triangle mesh <i>M</i> into a Delaunay mesh. We show that the constructed DM has <i>O</i>(<i>Kn</i>) vertices, where <i>n</i> is the number of vertices in <i>M</i> and <i>K</i> is a(More)
This paper concentrates on self-healing in reconfigurable WLANs. To cope with the accidental network failure, a Distributed Network Self-Healing &#40;DNSH&#41; mechanism, including automatic network failure detection and appropriate network failure recovery is designed for independent reconfigurable APs in high-density WLANs. By automatically applying the(More)
In this paper, we consider a wireless communication pair powered with radio frequency (RF) signal, in which the transmitter first harvest energy from an energy access point and then transmit information to the destination. Optimization problems aiming at maximizing throughput are investigated with a consideration of two types of power constraints at the(More)
Intrinsic Delaunay triangulation (IDT) naturally generalizes Delaunay triangulation from R<sup>2</sup> to curved surfaces. Due to many favorable properties, the IDT whose vertex set includes all mesh vertices is of particular interest in polygonal mesh processing. To date, the only way for constructing such IDT is the edge-flipping algorithm, which(More)
We propose a system model and an evaluation methodology to describe the performance of general delay-constrained packet-media transport over networks protected by packet-level FEC. Furthermore, we describe an algorithm to compute the residual packet-loss rate after FEC decoding in delay-constrained packet-media transmissions. Finally, we illustrate the(More)
Computing centroidal Voronoi tessellations (CVT) has many applications in computer graphics. The existing methods, such as the Lloyd algorithm and the quasi-Newton solver, are efficient and easy to implement; however, they compute only the local optimal solutions due to the highly non-linear nature of the CVT energy. This paper presents a novel method,(More)