— Polymorphic worms can change their byte sequence as they replicate and propagate, thwarting the traditional signature analysis techniques used by many intrusion detection syste...
— In this paper we consider the problem of query and search in a network, e.g., searching for a specific node or a piece of data. We limit our attention to the class of TTL (tim...
— Distributed time synchronization is an important part of a sensor network where sensing and actuation must be coordinated across multiple nodes. Several time synchronization pr...
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
— Directional antennas are a promising option for use in ad-hoc networks for a variety of reasons, such as increased spatial reuse, reduced interference and enabling more effici...
—Wireless Community Networks (WCNs) are wide-area wireless networks whose nodes are owned and managed by volunteers. We focus on the provision of Internet access to mobile users ...
Elias C. Efstathiou, Pantelis A. Frangoudis, Georg...
— Striping is a resource aggregation technique that can improve application performance for a multihomed host by utilizing multiple interfaces. In this position paper, we argue i...
— The limited number of orthogonal channels and the autonomous installations of hotspots and home wireless networks often leave neighboring 802.11 basic service sets (BSS’s) op...
Chun-cheng Chen, Eunsoo Seo, Hwangnam Kim, Haiyun ...
Abstract— Adaptive rate/power control schemes have great potential to increase the throughput of wireless CDMA networks. In this paper, we investigate the additional gains achiev...
— This paper presents a scalable and flexible system for explicit rate congestion control in Multi-Protocol Label Switched networks. Resource Reservation Protocol is used to sign...