Abstract— Unlike the terrestrial wireless networks that utilize the radio channel, underwater networks use the acoustic channel, which poses research challenges in the medium acc...
Worms are arguably the most serious security threat facing the Internet. Seeking a detection technique that is both sufficiently efficient and accurate to enable automatic conta...
David Whyte, Evangelos Kranakis, Paul C. van Oorsc...
Abstract. This paper proposes to promote constraints to first-class status. In contrast to constraint propagation, which performs inference on values of variables, first-class co...
This paper presents a simple and robust method of designing the lossy-transmission-line interconnects in a network for multichip modules. This method uses wire-sizing entirely to ...
An emerging paradigm in peer-to-peer (P2P) networks is to explicitly consider incentives as part of the protocol design in order to promote good (or discourage bad) behavior. Howe...
Michael Piatek, Tomas Isdal, Arvind Krishnamurthy,...