Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...
Wireless channels usually face bursty errors, i.e., errors are prone to occur in clusters. These bit errors can be modeled using the Gilbert-Elliott model. When data packets are t...
—Intelligent mobile terminals (or users) of next generation wireless networks are expected to initiate voice over IP (VoIP) calls using session set-up protocols like H.323 or SIP...
Emerging computational paradigms such as global and ubiquitous computing require some rethinking and innovative research ideas in many computer science areas. In this work, we aim...
We present a distributed topology control protocol that runs on a d-QUDG for d ≥ 1/ √ 2, and computes a sparse, constant-spanner, both in Euclidean distance and in hop distance...
Kevin M. Lillis, Sriram V. Pemmaraju, Imran A. Pir...