— Packet dispersion techniques have been commonly used to estimate bandwidth in wired networks. However, current packet dispersion techniques were developed for wired network env...
Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and difficult to detect and stop. We propo...
Marco Domenico Aime, Giorgio Calandriello, Antonio...
Traditional Call Admission Control (CAC) schemes only consider call-level performance and are believed to be sufficient for the circuit-switched wireless network. Since the future...
— Flow control, including congestion control for data transmission, and rate control for multimedia streaming, is an important issue in information transmission in both wireline ...
— We define and study the scheduling complexity in wireless networks, which expresses the theoretically achievable efficiency of MAC layer protocols. Given a set of communicati...
Wireless sensor networks (WSNs) are commonly used for continuously monitoring applications. This paper investigates a base station assisted energy efficient routing for hierarchi...
All the proposed IP mobility protocols assume that the mobile nodes always have a mobility-aware IP stack. On the other hand, efficient micro-mobility solutions entail specific to...
Although directional antennas have been used in mobile communications systems for quite a long time, realistic applications of directional or smart antennas in wireless ad hoc net...