— Pervasive computing is a new and emerging technology. The concept of pervasiveness and its deployment into reality are still not well aligned. This is because the vision of per...
Fiona Mahon, Jelena Mitic, Micheal Crotty, Kevin D...
—The cognitive radio based IEEE 802.22 wireless regional area network (WRAN) is designed to operate in the under–utilized TV bands by detecting and avoiding primary TV transmis...
Shamik Sengupta, R. Chandramouli, Swastik Brahma, ...
This paper introduces a novel feedback arrangement, termed re-feedback. It ensures metrics in data headers such as time to live and congestion notification will arrive at each re...
Bob Briscoe, Arnaud Jacquet, Carla Di Cairano-Gilf...
The main goal of the NETSEC project is to design and implement a framework for mitigating the effects of the node-based and link-based DoS attacks. Our strategy employs three lin...
Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb...
Telephony over IP is exposed to multiple security threats. Conventional protection mechanisms do not fit into the highly dynamic, open and large-scale settings of VoIP infrastructu...