— We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like cover...
— An important element of any routing protocol used for Wireless Mesh Networks (WMNs) is the link cost function used to represent the radio link characteristic. The majority of t...
— The potential problem of oversubscribing receivers in receiver-driven multicast is addressed. We present a framework based on harmonizing the erasure-resilience properties of v...
By analyzing a two-month trace of more than 25 million emails received at a large US university campus network, of which more than 18 million are spam messages, we characterize th...
—The IEEE 802.22 standard for wireless regional area network is the first standard for cognitive radio that tries to harness the idle or under-utilized spectrum allocated for TV...
The IEEE 802.11 based Wireless LANs (WLANs) have emerged as a viable technology for supporting real-time applications such as Voice over IP (VoIP). Even the Personal Digital Assist...
— As content delivery to wireless devices becomes faster and scalable, it is likely that mobile commerce will constitute a significant portion of digital commerce. In markets, b...
Abstract— In this paper we advocate to exploit terminal cooperation to stabilize IP communication using header compression. The terminal cooperation is based on direct communicat...
Tatiana K. Madsen, Qi Zhang, Frank H. P. Fitzek, M...
—Cooperative broadcast aims to deliver common messages to all receiver nodes in the wireless network by utilizing cooperation between them. This can have many important applicati...
—OFDM-FDMA/SDMA is currently considered as the leading transmission strategy for the downlink of beyond 3G mobile radio systems. When channel state information is available at th...