—While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-...
—We extend the analysis of the scaling laws of wireless ad hoc networks to the case of correlated nodes movements, which are commonly found in real mobility processes. We conside...
Abstract--This paper presents a method for supporting wireless media streaming using a cache that is distributed across the mobile devices in the network. The performance of this s...
Hazem Gomaa, Geoffrey G. Messier, Robert J. Davies...
We consider a wireless multi-hop network and design an algorithm for jointly optimal scheduling of packet transmissions and network coding. We consider network coding across differ...
This article develops a method for drawing samples from which it is impossible to infer any quantile or moment of the underlying distribution. The method provides researchers with...