— This paper investigates the behavior of a Wireless Mesh Network in which the nodes are equipped with a multiple antenna system. The objective of this study is the comparison of...
—In this paper, we propose a link-directionality-based dual channel MAC protocol in an attempt to double the capacities of networks using the single-channel 802.11 protocol. Simu...
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
The problem of rollback recovery is traditionally approached using a model oriented to packet delivery. Instead, we introduce a model centered around complex sessions, and we expl...
Abstract—We investigate the problem of providing a fair bandwidth allocation to each of flows that share the outgoing link of a congested router. The buffer at the outgoing link...