Abstract—Our previous study comparing analytically a comprehensive set of reliable data streaming protocols has shown that an hybrid protocol comprising stop-and-wait hop-by-hop ...
Tuan D. Le, Yifei Dong, Ren Liu, Sanjay Jha, Zvi R...
—We have created a large-scale information delivery platform optimized for mobile phones and used it for many months now to run a content delivery service through SMS. We share t...
Thejovardhana Kote, S. Ramamirtham Jeyashankher, L...
Some works are reported in the frequency domain watermarking using Single Value Decomposition (SVD). The two most commonly used methods are based on DCT-SVD and DWTSVD. The commonl...
K. A. Navas, M. C. Ajay, M. Lekshmi, T. S. Archana...
— In this paper, we propose a new security metric for measuring resilience of a symmetric key distribution scheme in wireless sensor network. A polynomial-based and a novel compl...
— We design a framework that implements security at the TCP layer to meet the necessity for a practical and truly end-to-end security solution. We call our framework TCPsec. TCPs...
—In this paper we consider tracking a target moving in a 2D plane using a network of sensors, each of which is capable of detecting presence of the target in its vicinity and com...