SensoLab group
Title | SensoLab group |
---|
Latest research outputs
Sort by Date Title
Measurement campaign on transmit delay diversity for mobile DVB-T/H systems
Di Bari, R., Bard, M., Arrinda, A., Ditto, P., Araniti, G., Cosmas, J., Loo, J. and Nilavalan, R. 2010. Measurement campaign on transmit delay diversity for mobile DVB-T/H systems. IEEE Transactions on Broadcasting. 56 (3), pp. 369-378. https://doi.org/10.1109/TBC.2010.2050030Article
Error-resilient scheme for wavelet video codec using automatic ROI detection and wyner-ziv coding over packet erasure channel
Xue, Z., Loo, J., Cosmas, J., Tun, M., Feng, L. and Yip, P. 2010. Error-resilient scheme for wavelet video codec using automatic ROI detection and wyner-ziv coding over packet erasure channel. IEEE Transactions on Broadcasting. 56 (4), pp. 481-493. https://doi.org/10.1109/TBC.2010.2058371Article
Cognitive mesh networks: cognitive radio over fiber for microcells applications
Al-Dulaimi, A., Al-Raweshidy, H., Cosmas, J. and Loo, J. 2010. Cognitive mesh networks: cognitive radio over fiber for microcells applications. IEEE Vehicular Technology Magazine. 5 (3), pp. 54-60. https://doi.org/10.1109/MVT.2010.938272Article
Impacts of buffering voice calls in integrated voice and data services
Gemikonakli, E., Gemikonakli, O., Ever, E., Mapp, G. and Institute of Electrical and Electronics Engineers 2011. Impacts of buffering voice calls in integrated voice and data services. Al-Dabass, D., Orsoni, A., Cant, R. and Abraham, A. (ed.) IEEE. pp. 507-512 https://doi.org/10.1109/UKSIM.2011.103Conference paper
Wireless mesh network security: a traffic engineering management approach
Muogilim, O., Loo, J. and Comley, R. 2011. Wireless mesh network security: a traffic engineering management approach. Journal of Network and Computer Applications. 34 (2), pp. 478-491. https://doi.org/10.1016/j.jnca.2010.03.027Article
Special issue on efficient and robust security and services of wireless mesh networks
Loo, J. 2011. Special issue on efficient and robust security and services of wireless mesh networks. Journal of Network and Computer Applications. 34 (2), pp. 429-431.Article
Optimisation of the recording and readout performance of phase-change media for scanning probe storage applications
Wright, C., Aziz, M., Wang, L. and Shah, P. 2009. Optimisation of the recording and readout performance of phase-change media for scanning probe storage applications. European Phase Change and Ovonic Symposium. Aachen, Germany Sep 2009Conference paper
Towards ultra-high density scanning-probe memory using rewritable phase-change media
Wang, L., Shah, P., Wright, C. and Aziz, M. 2010. Towards ultra-high density scanning-probe memory using rewritable phase-change media. European Phase Change and Ovonic Conference. Milan, Italy 05 - 07 Sep 2010Conference poster
Phase-change technologies: from PCRAM to probe-storage to processors
Wright, C., Ashawaraya, P., Ashwin, P., Aziz, M., Hicken, R., Kohary, K., Liu, Y., Marmier, A., Shah, P., Vazquez, J. and Wang, L. 2010. Phase-change technologies: from PCRAM to probe-storage to processors. European Phase Change and Ovonic Conference. Milano 05 - 07 Sep 2010Conference paper
Exploring multi-homing issues in heterogeneous networks
Mapp, G., Aiash, M., Guardia, H., Crowcroft, J., Institute of Electrical and Electronics Engineers, Middlesex University, Federal University of Sao Paulo and University of Cambridge 2011. Exploring multi-homing issues in heterogeneous networks. IEEE. pp. 690-695 https://doi.org/10.1109/WAINA.2011.140Conference paper
Iterative OFDM receiver with channel estimation and frequency-offset compensation.
Nguyen, H., Choi, J. and Institute of Electrical and Electronics Engineers 2006. Iterative OFDM receiver with channel estimation and frequency-offset compensation. IEEE. https://doi.org/10.1109/ICC.2006.255362Conference paper
Optimum performance model of ARQ protocol under adaptive modulation scheme.
Li, Y., Nguyen, H., Xing, W. and Institute of Electrical and Electronics Engineers 2008. Optimum performance model of ARQ protocol under adaptive modulation scheme. IEEE. pp. 225-229 https://doi.org/10.1109/ICC.2008.49Conference paper
Layered groupwise STBC: list-based decoding using flexible length.
Nguyen, H., Choi, J. and Institute of Electrical and Electronics Engineers 2008. Layered groupwise STBC: list-based decoding using flexible length. IEEE. pp. 703-707 https://doi.org/10.1109/ISSSTA.2008.137Conference paper
An efficient signal detection algorithm for 3GPP LTE downlink.
Nguyen, H. 2010. An efficient signal detection algorithm for 3GPP LTE downlink. Palelogu, C. (ed.) IEEE. pp. 77-81 https://doi.org/10.1109/ICDT.2010.22Conference paper
Performance bounds for MMSE-based signal detection in LTE downlink
Nguyen, H. 2010. Performance bounds for MMSE-based signal detection in LTE downlink. IEEE.Conference paper
Network coding-based ARQ retransmission strategies for two-way wireless relay networks.
Vien, Q., Tran, L., Nguyen, H. and Institute of Electrical and Electronics Engineers 2010. Network coding-based ARQ retransmission strategies for two-way wireless relay networks. IEEE. pp. 180-184Conference paper
Efficient ARQ retransmission schemes for two-way relay networks.
Vien, Q., Tran, L. and Nguyen, H. 2011. Efficient ARQ retransmission schemes for two-way relay networks. Journal of Communication Software and Systems. 7 (1).Article
Radio-over-fibre to increase effective coverage of motorway access networks.
Xing, W., Li, Y., Nguyen, H. and Zheng, J. 2009. Radio-over-fibre to increase effective coverage of motorway access networks. International Journal of Communication Networks and Distributed Systems. 2 (2/3), pp. 331-351. https://doi.org/10.1504/IJCNDS.2009.022338Article
Iterative (turbo processing) receiver design of OFDM systems in the presence of carrier frequency offset.
Nguyen, H., Choi, J. and Tianfield, H. 2010. Iterative (turbo processing) receiver design of OFDM systems in the presence of carrier frequency offset. International Transactions on Systems Science and Applications. 6 (1), pp. 82-93.Article
DALICA: intelligent agents for user profile deduction.
Costantini, S., Mostarda, L., Tocchio, A., Tsintza, P. and Knowledge Systems Institute Graduate School. 2007. DALICA: intelligent agents for user profile deduction. I. Illinois Knowledge Systems Institute Graduate School,.Conference paper
Agents and security in a cultural assets transport scenario.
Costantini, S., Mostarda, L., Tocchio, A. and Tsintza, P. 2007. Agents and security in a cultural assets transport scenario. Workshop from Objects to Agents.. Genova, Italy 24 - 25 Sep 2007Conference paper
A geo time authentication system.
Mostarda, L., Tocchio, A., Inverardi, P. and Costantini, S. 2007. A geo time authentication system. Springer. https://doi.org/10.1007/978-0-387-73655-6_9Conference paper
Place and time authentication of cultural assets.
Mostarda, L., Dong, C. and Dulay, N. 2008. Place and time authentication of cultural assets. Springer.Conference paper
A state machine-based approach for reliable adaptive distributed systems.
Mostarda, L., Sykes, D. and Dulay, N. 2010. A state machine-based approach for reliable adaptive distributed systems. Sterritt, R. and McCann, J. (ed.) IEEE. https://doi.org/10.1109/EASe.2010.19Conference paper
A policy-based publish/subscribe middleware for sense-and-react applications
Russello, G., Mostarda, L. and Dulay, N. 2011. A policy-based publish/subscribe middleware for sense-and-react applications. Journal of Systems and Software. 84 (4), pp. 638-654. https://doi.org/10.1016/j.jss.2010.10.023Article
A distributed intrusion detection approach for secure software architecture.
Inverardi, P. and Mostarda, L. 2005. A distributed intrusion detection approach for secure software architecture. Springer. https://doi.org/10.1007/11494713_12Conference paper
Synthesis of correct and distributed adaptors for component-based systems: an automatic approach.
Inverardi, P., Mostarda, L., Tivoli, M. and Autili, M. 2005. Synthesis of correct and distributed adaptors for component-based systems: an automatic approach. IEEE. pp. 405-409Conference paper
A distributed monitoring system for enhancing security and dependability at architectural level.
Inverardi, P. and Mostarda, L. 2007. A distributed monitoring system for enhancing security and dependability at architectural level. Springer. https://doi.org/10.1109/AINA.2006.145Conference paper
Distributed IDSs for enhancing security in mobile wireless sensor networks.
Inverardi, P., Mostarda, L. and Navarra, A. 2006. Distributed IDSs for enhancing security in mobile wireless sensor networks. 20th International Conference on Advanced Information Networking and Applications (AINA). IEEE. pp. 116-120 https://doi.org/10.1109/AINA.2006.145Conference paper
DESERT: a decentralized monitoring tool generator.
Inverardi, P. and Mostarda, L. 2007. DESERT: a decentralized monitoring tool generator. IEEE.Conference paper
Synthesis of decentralized and concurrent adaptors for correctly assembling distributed component-based systems
Autili, M., Mostarda, L., Navarra, A. and Tivoli, M. 2008. Synthesis of decentralized and concurrent adaptors for correctly assembling distributed component-based systems. Journal of Systems and Software. 81 (12), pp. 2210-2236. https://doi.org/10.1016/j.jss.2008.04.006Article
Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks.
Mostarda, L. and Navarra, A. 2008. Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks. International Journal of Distributed Sensor Networks. 4 (2), pp. 83-109. https://doi.org/10.1080/15501320802001119Article
DALICA: Agent-based ambient intelligence for cultural-heritage scenarios
Costantini, S., Mostarda, L., Tocchio, A. and Tsintza, P. 2008. DALICA: Agent-based ambient intelligence for cultural-heritage scenarios. IEEE Intelligent Systems. 23 (2), pp. 34-41. https://doi.org/10.1109/MIS.2008.24Article
ESCAPE: a component-based policy framework for sense and react applications.
Russello, G., Mostarda, L. and Dulay, N. 2008. ESCAPE: a component-based policy framework for sense and react applications. Springer. https://doi.org/10.1007/978-3-540-87891-9_14Conference paper
Policies for self tuning home networks.
Pediaditakis, D., Mostarda, L., Dong, C. and Dulay, N. 2009. Policies for self tuning home networks. POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks.. London 20 - 22 Jul 2009 pp. 29-32Conference paper
Context-based authentication and transport of cultural assets.
Mostarda, L., Dong, C. and Dulay, N. 2010. Context-based authentication and transport of cultural assets. Personal and Ubiquitous Computing. 14 (4), pp. 321-334. https://doi.org/10.1007/s00779-009-0233-8Article
An architectural framework for analyzing tradeoffs between software security and performance.
Cortellessa, V., Trubiani, C., Mostarda, L. and Dulay, N. 2010. An architectural framework for analyzing tradeoffs between software security and performance. ISARCS 2010: 1st International Symposium on Architecting Critical Systems Federated with CompArch 2010. Prague 23 - 25 Jun 2010 pp. 1-18Conference paper
Distributed fault tolerant controllers
Mostarda, L., Ball, R. and Dulay, N. 2010. Distributed fault tolerant controllers. Springer. https://doi.org/10.1007/978-3-642-13645-0_11Conference paper
Distributed orchestration of pervasive services.
Mostarda, L., Marinovic, S. and Dulay, N. 2010. Distributed orchestration of pervasive services. and Applications. IEEE. pp. 166-173 https://doi.org/10.1109/AINA.2010.100Conference paper
Formalizing homogeneous language embeddings.
Clark, T. and Tratt, L. 2010. Formalizing homogeneous language embeddings. Electronic Notes in Theoretical Computer Science. 253 (7), pp. 75-88. https://doi.org/10.1016/j.entcs.2010.08.033Article
0
total views0
total downloads0
views this month0
downloads this month