— Detecting all kinds of intrusions efficiently requires a global view of the monitored network. Built to increase the security of computer networks, traditional IDS are unfortu...
In this paper, a novel approximate link-state dissemination framework, called TROP, is proposed for shared backup path protection (SBPP) in Multi-Protocol Label Switching (MPLS) ne...
The paper1 presents and compares various unicast nonblocking architectures to be used into space-domain photonic switching networks. All the analyzed architectures have been evalu...
Luigi Savastano, Guido Maier, Mario Martinelli, Ac...
Abstract. A number of recently proposed mobile sensor network architectures rely on uncontrolled, or weakly-controlled mobility to achieve sensing coverage over time at low cost, a...
Shane B. Eisenman, Nicholas D. Lane, Andrew T. Cam...
Frequency overlap across wireless networks with different radio technologies can cause severe interference and reduce communication reliability. The circumstances are particularly...
Chieh-Jan Mike Liang, Bodhi Priyantha, Jie Liu, An...