—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...
— Due to the real time nature and buddy list presence information of Instant Messaging (IM) systems worms can spread over IM networks rapidly, causing severe damages, however, it...
Asynchronous quasi-delay-insensitive (QDI) NoCs have several advantages over their clocked counterparts. Virtual channel (VC) is the most utilized flow control method in asynchro...
In this paper we present a new approach to model the effect of virtual channel multiplexing in high-speed interconnection networks. Previous studies have used a method proposed by...
Nasser Alzeidi, Ahmad Khonsari, Mohamed Ould-Khaou...
This paper presents a mesh with virtual buses as the bandwidth-efficient implementation of the mesh with multiple broadcasting on which many computational problems can be solved w...
Jong Hyuk Choi, Bong Wan Kim, Kyu Ho Park, Kwang-I...