In this paper we first present a model to analyze the average and standard deviation of the delay in a 802.11e EDCA WLAN under voice traffic. Next, based on this model, we compute ...
In this contribution1 , we investigate the idea of using cognitive radio to reuse locally unused spectrum to increase the total system capacity. We consider a multiband/wideband sy...
Online classification of network traffic is very challenging and still an issue to be solved due to the increase of new applications and traffic encryption. In this paper, we prop...
Broadcasting is a vital communication mechanism in Mobile Ad Hoc Networks, as it is the key element for exchanging control packets to support some services such as management and ...
Dimitrios Liarokapis, Alireza Shahrabi, Andreas Ko...
The accuracy of the object tracking is dependent on the tracking time interval. Smaller tracking time interval increases the accuracy of tracking a moving object. However, this inc...
Hadi Jamali Rad, Bahman Abolhassani, Mohammad Abdi...
—MANET routing protocols are designed to scale up to thousands of routers with frequent changes of the topology. In preference, MANET routing protocols should also support constr...
We address security solutions to protect the communication of the wireless components of a home health care system. We analyze especially the problem of exchanging secrets to sati...