In dangerous and uncertain environments initial plans must be revised. Communication failures hamper this replanning. We introduce fractured subteams as a novel formalism for mode...
Recent research results show that a wireless ad hoc network can exploit controlled node mobility to reduce communication energy consumption. Node movement, however, may consume a ...
In this paper, we consider a discrete-time finite-buffer queue with correlated arrivals and service interruptions and the corresponding infinite-buffer queue. Under some assumptio...
—Revocation of public-key certificates is an important security primitive. In this paper, we design a fully distributed local certificate revocation scheme for ephemeral networ...
Igor Bilogrevic, Mohammad Hossein Manshaei, Maxim ...
Software architectural design is essential for complex distributed applications. Architectural specifications need to define the key aspects of the application, including its inte...
M. Cecilia Bastarrica, Steven A. Demurjian, Alexan...