Wireless operators incorporate multiradio access technologies aiming at expanding their customer base and benefiting from synergies of existing and planned infrastructure. The res...
Spi2Java is a tool that enables semi-automatic generation of cryptographic protocol implementations, starting from verified formal models. This paper shows how the last version o...
In this paper, we investigate some of the issues that arise when mobile nodes engage voice connections with remote peers by using a wireless ad hoc network (MANET–cell) to acces...
Elena Fasolo, Federico Maguolo, Andrea Zanella, Mi...
This paper presents a more efficient Java Remote Method Invocation (RMI) implementation for high-speed clusters. The use of Java for parallel programming on clusters is limited b...
Guillermo L. Taboada, Carlos Teijeiro, Juan Touri&...
One of the difficulties of optical packet switched networks is buffering optical packets in the network. Currently, one solution that can be used for buffering in the optical dom...
An optimally working mobile system requires tight cooperation and an information stream that flows impeccably between its components. This, however, is not the current state of t...
Successes and failures during rescue operations after hurricane Katrina and the Twin Towers attack demonstrated the importance of supporting first responders with adequate means t...
Marco Roccetti, Mario Gerla, Claudio E. Palazzi, S...
This paper focuses on network coding based multirate multimedia streaming in directed networks and aims at maximizing the total layers received by all receivers, which directly de...
We propose increasing the survivability of data stored in two-dimensional RAID arrays by letting these arrays reorganize themselves whenever they detect a disk failure. This reorg...
Tuning the performance of applications requires understanding the interactions between code and target architecture. This paper describes a performance modeling approach that not ...