In this paper, a novel solution to dynamically control the resources of a WiMAX system is proposed. The presented solution is aligned with the NGN trends, as well as with the WiMA...
This work addresses the high-rate session scheduling problem in Fractional Lambda Switching (FλS) networks. With its global phase synchronization and pipeline forwarding (PF) ope...
Determining where a given sensor is physically located is a challenging issue. In this paper, we address the localization problem where, initially, a certain number of sensors cal...
: Owing to the recent technical advances in the computing and mobile communications domain, the world of online virtual communities is experiencing a phenomenal growth and ever-inc...
Pravin Pawar, Julien Subercaze, Pierre Maret, Bert...
Network monitoring is a complex task that generally requires the use of different tools for specific purposes. This paper describes a flexible network monitoring tool, called Pa...
Natascha Petry Ligocki, Carmem S. Hara, Christiano...
— This paper analyzes a trust model for mobile ad hoc networks. We provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers t...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
Mobile IPv6 (MIPv6) protocol is a new protocol designed to support the node mobility ofIPv6 protocol, which is a basic protocol of the next generation Internet. Protocol testing c...
—This paper presents VoRaQue, a software layer supporting range queries on Voronoi P2P overlays. VoRaQue maps data in a 2-dimensional space. The P2P overlay is defined by links ...
Michele Albano, Laura Ricci, Martina Baldanzi, Ran...
—This paper discusses wireless mesh network topology visualization tools and their requirements. It presents an interactive tool for visualizing mesh network topologies. The prop...