—We propose a new multi-hop routing protocol for wireless sensor networks, suited for monitoring and control applications. The aim of this research is to adapt flat and hierarch...
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
The subject of this article is the long standing open problem of developing a general capacity theory for wireless networks, particularly a theory capable of describing the fundam...
Jeffrey G. Andrews, Nihar Jindal, Martin Haenggi, ...
We propose a new data dissemination protocol for wireless sensor networks, that basically pulls some additional knowledge about the network in order to subsequently improve data fo...
Ioannis Chatzigiannakis, Athanasios Kinalis, Sotir...
Energy efficient office lighting systems can save 40% in electricity consumption in areas that receive significant amounts of daylight. In spite of the savings they can generate, ...
Yao-Jung Wen, Jessica Granderson, Alice M. Agogino