Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
Abstract. In this paper we examine the database management of spatiotemporal resource information in mobile peer-to-peer networks, where moving objects communicate with each other ...
Abstract. Modeling the competition among telecommunication operators (or providers) as a repeated game may explain why tacit collusion to maintain high charging prices can be obser...
This paper develops a simple model that explores the extent to which differences in connectivity quality can be effective incentives (or disincentives) towards migrating to an IPv...
In this note, we discuss issues pertaining to end-to-end qualityof-service management of commodity Internet applications and associated pricing incentive mechanisms. The issue of ...