When a new component is added to an existing, distributed system, it has to co-operate with existing components in a way that doesn’t interfere badly with the original system. A...
— An approach to mitigating interference between 802.16 license-exempt systems is proposed in this paper. More specifically, the approach focuses on solving problems which arise...
We discuss the tensions between intensionality and extensionality of spatial observations in distributed systems, showing that there are natural models where extensional observati...
A peer-to-peer file sharing system includes a lookup and a content distribution protocol. Very efficient peer-to-peer protocols exist for content distribution, but efficient in...
Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and difficult to detect and stop. We propo...
Marco Domenico Aime, Giorgio Calandriello, Antonio...