Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
We present measurement approaches to evaluate performance optimizations, employed at different layers of the protocol stack, to enhance application performance over wide-area wire...
Rajiv Chakravorty, Julian Chesterfield, Pablo Rodr...
- This paper suggests that since web browsing is an interactive process and downloading a web page can take several seconds to several minutes over slow links, the information pres...
Abstract. We present WBext (Web Browser extended), a web browser extended with client-side mining capabilities. WBext learns sophisticated user interests and browsing habits by tai...
—In mobile devices, the wireless network interface card (WNIC) consumes a significant portion of overall system energy. One way to reduce energy consumed by a WNIC is to transit...
Haijin Yan, Rupa Krishnan, Scott A. Watterson, Dav...