Although many location schemes have been proposed and analyzed, the tradeoff among the location registration and the call delivery of different schemes and the relative performanc...
Abstract--In this paper we present the design, implementation, and performance analysis of Group-Aided Multicast (GAM), a scalable many-tomany reliable multicast transport protocol...
This paper presents a secure alternate path routing in sensor networks. Our alternate path scheme makes the routing protocol resilient in the presence of malicious nodes that laun...
The high bandwidth and the relatively long-lived characteristics of digital video are key limiting factors in the wide-spread usage of streaming content over the Internet. The pro...
Yang Guo, Zihui Ge, Bhuvan Urgaonkar, Prashant J. ...
As the Internet evolves into an all-IP communication infrastructure, a key issue to consider is that of creating and managing IP-based services with efficient resource utilization...
Yu Cheng, Ramy Farha, Myung-Sup Kim, Alberto Leon-...
4-Regular grid structures have been used in multiprocessor systems for decades due to a number of nice properties with regard to routing, protection, and restoration, together wit...
Jens Myrup Pedersen, Ahmed Patel, Thomas Phillip K...
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemin...
In many data broadcasting applications clients are grouped into several groups, each one located at a different region, with the members of each group having similar demands. This...
Petros Nicopolitidis, Georgios I. Papadimitriou, M...