When the network is homogeneous, choosing the cipher type for a packet telephony application is simple. It is clear that stream ciphers perform better than block ciphers over land...
Distributed estimation of an unknown signal is a common task in sensor networks. The scenario usually envisioned consists of several nodes, each making an observation correlated wi...
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control (MAC) protocol. However, very little has been done on investigating the interplay betw...
This paper outlines our experience with the implementation and deployment of two MANET routing protocols on a five node, four hop, network. The work was prompted by the lack of pu...
Kwan Wu Chin, John Judge, Aidan Williams, Roger Ke...
Telemedicine is many things to many people. Only until a few years ago, telemedicine was equated to video teleconferencing between physicians, while nowadays, perhaps the most acti...
Sang-goo Lee, Seong K. Mun, Prakash Jha, Betty Ann...