• Publications
  • Influence
Ad Hoc Wireless Networks - A Communication-Theoretic Perspective
Preface. List of Acronyms. 1 Related Work and Preliminary Considerations. 1.1 Introduction. 1.2 Related Work. 1.3 A New Perspective for the Design of Ad Hoc Wireless Networks. 1.4 Overview of theExpand
  • 204
  • 29
  • PDF
Optimal Transmit Power in Wireless Sensor Networks
TLDR
In this paper, we investigate the optimal common transmit power, defined as the minimum transmit power used by all nodes necessary to guarantee network connectivity. Expand
  • 170
  • 22
  • PDF
IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios
TLDR
We propose an architecture targeting HTTP/CoAP services to provide an authorization framework, which can be integrated by invoking an external oauth-based authorization service (OAS). Expand
  • 173
  • 10
  • PDF
Fundamental performance limits of communications systems impaired by impulse noise
TLDR
In this paper, we investigate the ultimate performance limits, in terms of achievable information rate (IR), of communication systems impaired by impulse noise. Expand
  • 80
  • 9
  • PDF
Reduced-state BCJR-type algorithms
TLDR
We propose a technique to reduce the number of trellis states in BCJR-type algorithms, i.e., algorithms with a structure similar to that of the well-known algorithm by Bahl, Cocke, Jelinek and Raviv (1974). Expand
  • 43
  • 8
Sensor Networks with IEEE 802.15.4 Systems
TLDR
This book presents a simple, yet complete, approach to the design and performance analysis of distributed processing algorithms and techniques suitable for IEEE 802.15.4 networks, focusing on the bottom two layers of the ISO/OSI stack (Physical and Medium Access Control). Expand
  • 25
  • 8
  • PDF
A Scalable and Self-Configuring Architecture for Service Discovery in the Internet of Things
TLDR
We propose a scalable and self-configuring peer-to-peer (P2P)-based architecture for large-scale IoT networks, aiming at providing automated service and resource discovery mechanisms, which require no human intervention for their configuration. Expand
  • 183
  • 7
  • PDF
Irresponsible forwarding
TLDR
We propose a new probabilistic-based rebroadcast scheme, denoted as Irresponsible Forwarding, where each vehicle rebroadcasts a received information on the basis of (i) its distance from the source and (ii) the density of its neighbors. Expand
  • 58
  • 7
Extrinsic information in iterative decoding: a unified view
TLDR
We address the use of the extrinsic information generated by each component decoder in an iterative decoding process. Expand
  • 86
  • 7
  • PDF
Serial concatenation of LDPC codes and differential modulations
TLDR
We optimize, through a "clever" random walk in parametric space, the degree distributions of the outer LDPC codes, obtaining significant insights on the impact of such distributions on the performance of the proposed concatenated schemes. Expand
  • 47
  • 7
  • PDF