— We consider packet transmission scheduling at the MAC-layer via adaptive backoff algorithms that are favorable in terms of queue occupancies in a wireless network. General netw...
— Motivated by the widespread of file and video streaming over peer-to-peer networks, we propose to investigate the design of a peer-to-peer solution for image-based remote walk...
— The IEEE 802.11e standard supports a Direct-Link Setup (DLS) mechanism optionally to improve the throughput. Using this mechanism, IEEE 802.11e stations in proximity can direct...
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Avatars are increasingly used to express our emotions in our online communications. Such avatars are used based on the assumption that avatar expressions are interpreted universall...