Many advancements in the area of Secure Multi-Party Computation (SMC) protocols use improvements in communication complexity as a justification. We conducted an experimental stud...
Florian Kerschbaum, Daniel Dahlmeier, Axel Schr&ou...
A common shortcoming of many network measurement programs is that their metrics are not expressed in terms directly applicable to applications and users. To address this problem, ...
Bruce A. Mah, Peter E. Sholander, Luis Martinez, L...
In this work, we analyze the effects of a distributed transmission coordination scheme that is particularly suited for ad hoc networks with the ability to exploit spatially–mult...
Distributed embedded sensor networks are now being successfully deployed in environmental monitoring of natural phenomena as well as for applications in commerce and physical secur...
Richard Pon, Maxim A. Batalin, Victor Chen, Aman K...
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control (MAC) protocol. However, very little has been done on investigating the interplay betw...