Abstract. Performance of real-time applications on network communication channels are strongly related to losses and temporal delays. Several studies showed that these network feat...
Pierluigi Salvo Rossi, Francesco Palmieri, Giulio ...
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...
In this paper we evaluate NORM, a NO-Reference video quality Monitoring algorithm we proposed in a previous work, for the prediction of the subjective quality of H.264/AVC video t...
—End to end available bandwidth is often constrained by IEEE 802.11 hops in the access network. Available bandwidth measurement is particularly challenging in the wireless enviro...
— In this paper, we present an enhanced adaptive frequency hopping (EAFH) mechanism for improving the performance of frequency hopping-based wireless personal area networks (WPAN...
Alex Chia-Chun Hsu, David S. L. Wei, C. C. Jay Kuo...