Abstract—Handling mobility at the transport layer is a promising approach to achieve seamless handover in the context of heterogeneous wireless access networks. In particular, fe...
A novel solution to the reliable multicast problem is the “digital fountain” approach, in which data is encoded with an erasure protection code before transmission, and receiv...
— This paper presents a resource-efficient protocol for opportunistic routing in delay-tolerant networks (DTN). First, our approach exploits the context of mobile nodes (speed, ...
In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protec...
The availability of positional information is of great importance in many commercial, public safety, and military applications. The coming years will see the emergence of locationa...