Many mobile applications can be greatly enhanced when provided with the locations of people and devices. Ultrasonic location systems have been shown to supply location information...
It has been shown in the literature that many MAC protocols for wireless networks have a considerable control overhead, which limits their achievable throughput and delay performan...
Yihan Li, Shiwen Mao, Shivendra S. Panwar, Scott F...
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Since TCP can only detect congestion after packet losses have already happened, various forms of Fast TCP (FTCP) have been proposed to notify congestion early and avoid packet los...