Specification of monitored context properties and their influence on behavior of Web services and management activities is a prerequisite for contextsensitive operation, which is ...
Fourth Generation (4G) is the next generation of wireless networks that will replace third Generation (3G) networks sometimes in future. 4G is intended to provide high speed, high...
Structured peer-to-peer overlay network is an efficient solution for querying and retrieving resources spread between the peers. Unfortunately, key based routing of Distributed Ha...
Mail channels allow an electronic mail (e-mail) user to have multiple points of contact, each with a potentially different policy. For example, a user may have two channels, one fo...
Automatic repeat request (ARQ) schemes are effective to recover non-real-time data corrupted by channel errors, but their use with real-time traffic is seldom considered because p...
Abstract. Bisimulation reduction is a classical means to fight the infamous state space explosion problem, which limits the applicability of automated methods for verification li...
Phase-type (PH) distributions are proven to be very powerful tools in modelling and analysis of a wide range of phenomena in computer systems. The use of these distributions in sim...
We present a tool for the analysis of fault-tolerance in packet-switched communication networks. Network elements like links or routers can fail or unexpected traffic surges may o...
David Hock, Michael Menth, Matthias Hartmann, Chri...
—Given the potential scale on which a Wireless Sensor Network (WSN) can be deployed, multi-hop communication will be a pivotal component of the system. When redundant nodes are d...
Richard Tynan, Gregory M. P. O'Hare, Michael J. O'...
In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts...