Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
To date, there is little evidence that modular reasoning about fault-tolerant systems can simplify the verification process in practice. We study this question using a prominent e...
Peer-to-peer based streaming has been a promising solution for large-scale video broadcasting over the Internet. In a peer-to-peer video streaming framework, peers cooperate with ...
The localization of sensor nodes is a fundamental problem in sensor networks and can be implemented using powerful and expensive beacons. Beacons, the fewer the better, can acquire...
When the range of single-hop wireless communication is limited by distance or harsh radio propagation conditions, relays can be used to extend the communication range through mult...
Michael R. Souryal, Johannes Geissbuehler, Leonard...