— Network dimensioning for wavelength-routed WDM networks has been extensively studied to maximize connection acceptance rate while minimizing the total cost. However, Internet s...
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
— Data collection using Autonomous Underwater Vehicles (AUVs) is increasing in importance within the oceanographic research community. Contrary to traditional moored or static pl...
Ryan N. Smith, Arvind Pereira, Yi Chao, Peggy Li, ...
This paper proposes an efficient chaos-reducing information dissemination approach for spatiotemporal traffic information related to first responders and planned evacuation scenar...
Syed Rashid Ali Rizvi, Stephan Olariu, Mona E. Riz...
This chapter describes a principled, yet computationally efficient way for a team of UAVs with Received Signal Strength Indicator (RSSI) sensors to locate radio frequency emitting...
Paul Scerri, Robin Glinton, Sean Owens, Steven Oka...