This paper covers the use of Java and its API for developing networking programs in an undergraduate computer networks class. Through the use of TCP and UDP sockets provided in th...
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
Many organisations and individuals are installing wireless local area networks (WLANs), which are based on the IEEE 802.11b standard. Insecurely configured WLANs present a threat ...
Surface reconstruction problem (SRP) from planar samples has been traditionally approached by either (i) using local proximity between data points in adjacent layers, or by (ii) c...
In this paper, we investigate the issue of per-station fairness in TCP over IEEE 802.11-compliant wireless local area networks (WLANs), especially in Wi-Fi hot spots. It is asserte...
Eun-Chan Park, Dong-Young Kim, Hwangnam Kim, Chong...