Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
Token passing medium access control (MAC) protocols are gaining interest amongst wireless ad hoc network researchers as they provide unrivalled advantages over the existing IEEE 80...
Real organisms live in a world full of uncertain situations and have evolved cognitive mechanisms to cope with problems based on actions and perceptions which are not always reliab...
Because it is an integral part of the Internet routing apparatus, and because it allows multiple instances of the same service to be "naturally" discovered, IP Anycast h...
Hussein A. Alzoubi, Seungjoon Lee, Michael Rabinov...
In this paper we present a general hybrid systems modeling framework to describe the flow of traffic in communication networks. To characterize network behavior, these models use...