—Enterprises are faced with the challenge of enabling IP multicast applications without exposing their network to multicast denial-of-service attacks. Current practice is to use ...
Shen Li, Vijay Sivaraman, Alex Krumm-Heller, Craig...
—In this paper, we study a new family of carrier-hopping prime codes (CHPCs), so-called quadraticcongruence CHPC (QC-CHPC), with expanded code cardinality by relaxing the maximum...
Wing C. Kwong, Cheng-Yuan Chang, Hung-Ta Chen, Guu...
—We propose Adaptive Coordination Protocol ACP, a lightweight protocol for distributed formation of a backbone over Heterogeneous Wireless Networks. ACP does not require any neig...
— The Datagram Congestion Control Protocol (DCCP) is a new IETF-defined transport protocol for Internet multimedia. The DCCP Congestion Control Identifier 4 (CCID4) was speci...
— We proposed a Hybrid Automatic Repeat reQuest (HARQ) packet transmission scheme for a Multiple Input Multiple Output (MIMO) system in a frequency selective fading channel. The ...
—When constructing an unstructured P2P topology, one should consider the application running on top of it in order to achieve a good performance for the whole P2P system. It is n...
— We consider a point-to-multipoint cognitive radio network that shares a set of channels with a primary network. Within the cognitive radio network, a base station (BS) controls...
— This paper analyzes some critical security issues in the family of IEEE 802.16 standard that has not been addressed so far. In particular two of the key features of the standar...
— We propose a new internetworking architecture that represents a departure from current philosophy and practice, as a contribution to the ongoing debate regarding the future Int...
Rudra Dutta, George N. Rouskas, Ilia Baldine, Arno...
Abstract— Optical Burst and Packet Switching are being considered as the most promising paradigms to increase bandwidth efficiency in IP over DWDM networks. In both cases, due t...