In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Sensor network applications are generally characterized by long idle durations and intermittent communication patterns. The traffic loads are typically so low that overall idle d...
—The hot spot problem is a typical byproduct of the many-to-one traffic pattern that characterizes most wireless sensor networks: the nodes with the best channel to the sink are ...
Increasing need for people to be “connected”; while at the same time remain as mobile as ever poses several interesting issues in wireless networks. It is conceivable in the n...
Alok Nandan, Shirshanka Das, Giovanni Pau, Mario G...
The push toward business process automation has generated the need for integrating different enterprise applications involved in such processes. The typical approach to integration...