Many of today's complex computer applications are being modeled and constructed using the principles inherent to real-time distributed object systems. In response to this dem...
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...
A lifetime of several years for wireless sensor nodes can be achieved if their activity period is minimized. This can be done by using low duty cycle protocols. One of the challeng...
Marcin Brzozowski, Hendrik Salomon, Peter Langendo...
Abstract— In this paper, based on the IEEE 802.11n proposal [1], a MIMO-OFDM baseband receiver design for nextgeneration WLAN is proposed. A MIMO-OFDM receiver with algorithms fo...
Abstract. Existing middleware is based on control-flow centric interaction models such as remote method invocations, poorly matching the structure of applications that process con...
Rainer Koster, Andrew P. Black, Jie Huang, Jonatha...