In this paper we consider the problem of target tracking in a network of mobile agents. We propose a scheme with agents that are endowed with processing and decision-making capabi...
—Establishing a clear and timely picture of Internet topology is complicated by many factors including the vast size and dynamic nature of the infrastructure. In this paper, we d...
Abstract— Fueled by the competing DSL and Cable technologies, residential broadband access has seen a significant spread in availability to the point that many users have a choi...
— Traditional network routing uses the single (shortest) path paradigm. This paradigm leaves the session vulnerable to a variety of security threats, such as eavesdropping. We pr...
One of crucial disadvantages of key predistribution schemes for ad hoc networks is that if devices A and B use a shared key K
to determine their session keys, then any adversarial...
Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutyl...