There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
Modern high performance routers rely on sophisticated interconnection networks to meet ever increasing demands on capacity. Previous studies have used a combination of analysis an...
Charlie Wiseman, Jonathan S. Turner, Ken Wong, Bra...
In this paper we present the design and implementation of the mission-oriented USLHCNet for HEP research community and the UltraLight network testbed. The design philosophy for th...
Harvey B. Newman, Dimitri Bourilkov, Julian J. Bun...
Recent studies on directional Media Access Control (MAC) protocols using smart antennas for wireless ad hoc networks have shown that directional MAC protocols outperform traditiona...
The first step required by the process of cognition is the intelligent observation of the environment that surrounds the actors of such a process. We present the CalRAdio-Based a...
Riccardo Manfrin, Luca Boscato, Andrea Zanella, Mi...