Many applications require protection of secret or sensitive information, from sensor nodes and embedded applications to large distributed systems. The confidentiality of data can b...
This paper discusses the ideal shapes of control frames (i.e., RTS/CTS frames) in the IEEE 802.11 MAC layer for efficient power control and directional beam forming in mobile ad h...
: We study a slotted version of the Aloha Medium Access (MAC) protocol in a Mobile Ad-hoc Network (MANET). Our model features transmitters randomly located in the Euclidean plane, ...
: In this paper we propose two analytically tractable stochastic models of non-slotted Aloha for Mobile Ad-hoc NETworks (MANETs): one model assumes a static pattern of nodes while ...
Model transformation means converting an input model available at the beginning of the transformation process to an output model. A widely used approach to model transformation us...