Abstract— Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition t...
This paper describes the design and implementation of a network virtualization substrate (NVS) for effective virtualization of wireless resources in WiMAX networks. Virtualization...
Ravi Kokku, Rajesh Mahindra, Honghai Zhang, Sampat...
We present and evaluate a method for estimating the relevance and calibrating the values of parameters of an evolutionary algorithm. The method provides an information theoretic m...
² Similar to humans and primates, artificial creatures like robots are limited in terms of allocation of their resources to huge sensory and perceptual information. Serial process...
Ali Borji, Majid Nili Ahmadabadi, Babak Nadjar Ara...
Being embedded in the physical world, sensor networks present a wide range of bugs and misbehavior qualitatively different from those in most distributed systems. Unfortunately, d...
Nithya Ramanathan, Kevin K. Chang, Rahul Kapur, Le...