The majority of the traffic (bytes) flowing over the Internet today have been attributed to the Transmission Control Protocol (TCP). This strong presence of TCP has recently spu...
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
— High-performance sockets implementations such as the Sockets Direct Protocol (SDP) have traditionally showed major performance advantages compared to the TCP/IP stack over Infi...
— Although a number of investigations have been conducted using IEEE 802.11e enabled networks to stream class differentiated video, very few reports are available based on a real...
The most widespread Wireless Local Area Networks (WLANs) are based today on the IEEE 802.11 standard and its various versions, especially the IEEE 802.11b. In this article we first...