55 research outputs found

    Unmanned Aerial Vehicle (UAV)-Enabled Wireless Communications and Networking

    Get PDF
    The emerging massive density of human-held and machine-type nodes implies larger traffic deviatiolns in the future than we are facing today. In the future, the network will be characterized by a high degree of flexibility, allowing it to adapt smoothly, autonomously, and efficiently to the quickly changing traffic demands both in time and space. This flexibility cannot be achieved when the network’s infrastructure remains static. To this end, the topic of UAVs (unmanned aerial vehicles) have enabled wireless communications, and networking has received increased attention. As mentioned above, the network must serve a massive density of nodes that can be either human-held (user devices) or machine-type nodes (sensors). If we wish to properly serve these nodes and optimize their data, a proper wireless connection is fundamental. This can be achieved by using UAV-enabled communication and networks. This Special Issue addresses the many existing issues that still exist to allow UAV-enabled wireless communications and networking to be properly rolled out

    Columbia Chronicle (04/17/2000)

    Get PDF
    Student newspaper from April 17, 2000 entitled Columbia Chronicle. This issue is 32 pages and is listed as Volume 33, Number 22. Cover story: Two separate assaults strike Columbia student, staffer Managing Editor: Valerie Dannerhttps://digitalcommons.colum.edu/cadc_chronicle/1478/thumbnail.jp

    Columbia Chronicle (11/20/2006)

    Get PDF
    Student newspaper from November 20, 2006 entitled The Columbia Chronicle. This issue is 28 pages and is listed as Volume 41, Number 12. Cover story: Backline takes front stage Editor-in-Chief: Hayley Grahamhttps://digitalcommons.colum.edu/cadc_chronicle/1687/thumbnail.jp

    The Whitworthian 1990-1991

    Get PDF
    The Whitworthian student newspaper, September 1990-May 1991.https://digitalcommons.whitworth.edu/whitworthian/1074/thumbnail.jp

    Casco Bay Weekly : 25 June 1998

    Get PDF
    https://digitalcommons.portlandlibrary.com/cbw_1998/1027/thumbnail.jp

    Strategic Latency Unleashed: The Role of Technology in a Revisionist Global Order and the Implications for Special Operations Forces

    Get PDF
    The article of record may be found at https://cgsr.llnl.govThis work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory in part under Contract W-7405-Eng-48 and in part under Contract DE-AC52-07NA27344. The views and opinions of the author expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC. ISBN-978-1-952565-07-6 LCCN-2021901137 LLNL-BOOK-818513 TID-59693This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory in part under Contract W-7405-Eng-48 and in part under Contract DE-AC52-07NA27344. The views and opinions of the author expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC. ISBN-978-1-952565-07-6 LCCN-2021901137 LLNL-BOOK-818513 TID-5969

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license
    • …
    corecore