This paper proposes a novel call admission control scheme capable of providing a combination of call and packet level quality of service requirements in cellular packet networks. ...
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
In this paper, we develop a rigorous, unified framework based on ordinary differential equations (ODEs) to study epidemic routing and its variations. These ODEs can be derived a...
Xiaolan Zhang, Giovanni Neglia, James F. Kurose, D...
We analyze the capacity of ultra-wide band (UWB) wireless access networks supporting multimedia services by calculating the number of multimedia connections that can be supported ...
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
A practical and robust inter-domain marking scheme for IP traceback is proposed. We first identify six drawbacks of Probabilistic Packet Marking (PPM), and then contrive a synerg...
Network stability is an important issue that has attracted the attention of many researchers in recent years. Such interest comes from the need to ensure that, as the system runs ...
Wireless broadband technologies provide ubiquitous broadband access to wireless users, enabling services that were available only to wireline users. In this paper, we summarize em...