Many sophisticated mechanisms have been implemented at both the transport and the network layers in order to estimate network conditions and avoid overload of network links. We ev...
Ageliki Tsioliaridou, Christos V. Samaras, Vassili...
The random oracle model is an idealized theoretical model that has been successfully used for designing many cryptographic algorithms and protocols. Unfortunately, a series of res...
We present a decentralized authorization architecture based on capabilities in which parties are able to exercise full control over their resources or delegate it in an ad-hoc man...
Feike W. Dillema, Simone Lupetti, Tage Stabell-Kul...
— This paper proposes few ways of improving a WSN’s energy efficiency that already uses an energy efficient data routing protocol for continuous monitoring application. The p...
The Mobile Agent (MA) paradigm advocates the migration of agent code to achieve computational goals. MAs require an executable environment on hosts where mobile code can be execut...
This paper proposes a routing metric known as Weighted Cumulative Expected Transmission Time with Load Balancing (WCETT-LB) for wireless mesh networks. WCETTT-LB enhances the basi...
The construction of multicast trees is complicated by the need to balance a number of important objectives, including: minimizing latencies, minimizing depth/hops, and bounding th...
The home environment becomes ready to host distributed devices dynamically adapting to service availability and reacting to user location and user activity. Sensors, high definiti...
In this paper we present the design of QOMET, the Wireless LAN (WLAN) emulator that we develop. Our approach to WLAN emulation is a versatile two-stage scenario-driven design. In ...
Razvan Beuran, Lan Tien Nguyen, Khin Thida Latt, J...