Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
Proxy Mobile IP (PMIP) provides a solution for networkbased localized mobility management which in contrast to host-based mobility solutions, like Mobile IP (MIP), does not requir...
Abstract-- Recovery of traffic in connectionless pure IP networks has traditionally been handled by a full re-convergence of the network state. This process operates in a time scal...
Audun Fosselie Hansen, Olav Lysne, Tarik Cicic, St...
The recent emergence of handheld devices and wireless networks has implied an exponential increase of terminals users. So, today, service providers have to propose new application...
In this paper we deal with the problem of modeling railway networks with Petri nets so as to apply the theory of supervisory control for discrete event systems to automatically de...