— Recent studies have shown that designing a Medium Access Control (MAC) protocol combined with a cooperative approach may improve the attainable network throughput, despite redu...
Botnets dominate today's attack landscape. In this work we investigate ways to analyze collections of malicious probing traffic in order to understand the significance of lar...
We consider a scenario in which there are resources at or near nodes of a network, which are either static (e.g. fire stations, parking spots) or mobile (e.g. police cars). Over ...
Jie Gao, Leonidas J. Guibas, Nikola Milosavljevic,...
—We reconsider the problem of geographic routing in wireless ad hoc networks. We are interested in local, memoryless routing algorithms, i.e. each network node bases its routing ...
Multihop cellular systems using fixed relay stations are the most promising candidate in the next generation of cellular systems. In order to maximize multihop transmission gains, ...
Chungha Koh, Kang Jin Yoon, Kyung-Ho Sohn, Suji Mo...