Continuous data protection, which logs every update to a file system, is an enabling technology to protect file systems against malicious attacks and/or user mistakes, because it ...
—Quantifying and querying network reachability is important for security monitoring and auditing as well as many aspects of network management such as troubleshooting, maintenanc...
We present Gatekeeper, a decentralized protocol that performs Sybil-resilient node admission control based on a social network. Gatekeeper can admit most honest nodes while limiti...
—A primary functionality of wireless sensor networks (WSNs) is transporting the information acquired by the sensors as per the desired application requirements. The diverse appli...
Abstract-- Simultaneous support of multiple delay-critical application sessions such as multiuser video streaming require a paradigm shift in the design of ad-hoc wireless networks...
Sachin Adlakha, Xiaoqing Zhu, Bernd Girod, Andrea ...