— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
—Several contention-based Medium Access Control (MAC) protocols have been proposed for the vehicles to gain the radio channels to distribute active safety messages timely, e.g., ...
Live migration is one of the most important features of virtualization technology. With regard to recent virtualization techniques, performance of network I/O is critical. Current...
Zhenhao Pan, Yaozu Dong, Yu Chen, Lei Zhang, Zhiji...
In this paper, we use the concept of colored edge graphs to model homogeneous faults in networks. We then use this model to study the minimum connectivity (and design) requirements...
—This paper presents an efficient protocol to reliably exchange information in a single-hop radio network with unpredictable interference. The devices can access C communication...
Seth Gilbert, Rachid Guerraoui, Dariusz R. Kowalsk...