Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
We investigate techniques for general black-box mitigation of timing channels. The source of events is wrapped by a timing mitigator that delays output events so that they contain...
This paper presents a control-theoretic approach to reactive flow control in networks that do not reserve bandwidth. We assume a round-robin-like queue service discipline in the o...
This paper proposes the utilization of GSM logical channels (RACH, AGCH and TCH) and UMTS signaling (MIB and SIBs) of the Broadcast Channel to transmit a Cognitive Beacon Channel (...
Rodrigo Soule de Castro, Philippe Godlewski, Phili...
Abstract-In this paper, we investigate the problem of providing QoS to end-to-end flows in multihop ad hoc networks with channel errors through packet scheduling. Each flow is asso...