Abstract. Wireless sensor network protocols and applications, including those used for localization, topology control, link scheduling, and link quality estimation, make extensive ...
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Many special-purpose embedded systems such as automobiles and aircrafts consist of multiple embedded controllers connected through embedded network interconnects. Such network inte...
In this paper, we show the feasibility of real-time flow monitoring with controllable accuracy in today’s IP networks. Our approach is based on Netflow and A-GAP. A-GAP is a prot...
— The design of a routing protocol must be based on the characteristics of its target networks. The diversity of wireless networks motivates the design of different routing metri...