— As a platform for synergistic theory-experiment exploration in the field of wireless networking, wireless testbeds have been used to facilitate a broad range of research. From...
Jing Lei, Roy D. Yates, Larry J. Greenstein, Hang ...
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Active queue management (AQM) schemes have motivated many researchers to investigate more effective methods to control network congestion. Most AQM schemes are evaluated by their ...
Chin-Fu Ku, Sao-Jie Chen, Jan-Ming Ho, Ray-I Chang
In on-demand multi-hop routing protocols for MANETs such as DSR and AODV, a fundamental requirement for peer-to-peer connectivity is to discover routes to a remote node via flood...
Dimitrios Koutsonikolas, Saumitra M. Das, Himabind...
Abstract. Numerical simulations can be the key to the thorough understanding of the multi-dimensional nature of transient detonation waves. But the accurate approximation of realis...