The problem of securing a network coding communication system against a wiretapper adversary is considered. The network implements linear network coding to deliver n packets from s...
Abstract— Two driving goals for cognitive radio (CR) technique are maximizing spectrum utilization and avoiding interference to primary users. In this paper, we deal with the CR ...
Zhanwei Sun, Ioannis Krikidis, J. Nicholas Laneman...
Routing protocols for wireless ad hoc networks have traditionally focused on finding paths with minimum hop count. However, such paths can include slow or lossy links, leading to...
— Wireless links pose significant challenges in terms of achievable goodput and residual loss-rate. Our recent enhancements, called LT-TCP make TCP loss-tolerant in heavy/bursty...
Vijaynarayanan Subramanian, K. K. Ramakrishnan, Sh...
The Internet is witnessing explosive growth in traffic due to bulk content transfers, such as multimedia and software downloads, and online sharing of personal, commercial, and sc...
Massimiliano Marcon, Nuno Santos, P. Krishna Gumma...