— HADOF is a set of mechanisms to defend against routing disruptions in mobile ad hoc networks. Based on the observed behavior and the history record of each node, HADOF aims to ...
— Traceback mechanisms are a critical part of the defense against IP spoofing and DoS attacks, as well as being of forensic value to law enforcement. Currently proposed IP trace...
On-demand routing protocols use route caches to make routing decisions. Due to frequent topology changes, cached routes easily become stale. To address the cache staleness issue i...
The primary purpose of a network is to provide reachability between applications running on end hosts. In this paper, we describe how to compute the reachability a network provide...
Geoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Z...
— Multihoming is a popular method used by large enterprises and stub ISPs to connect to the Internet to reduce cost and improve performance. Recently researchers have studied the...
Hao Wang, Haiyong Xie 0002, Lili Qiu, Abraham Silb...
— Battery capacity of mobile terminals and radio bandwidth are both limited and precious resources in wireless networks. In this paper, we present a thorough performance study of...
We discuss the modelling of FAST TCP and prove four stability results. Using the traditional continuous-time flow model, we prove, for general networks, that FAST TCP is globally ...
Abstract— Given a wireless ad hoc network and an endto-end traffic pattern, the power rate function refers to the minimum total power required to support different throughput un...
— Conventionally, most network protocols assume that the network entities who participate in the network activities will always behave as instructed. However, in practice, most n...
Weizhao Wang, Xiang-Yang Li, Zheng Sun, Yu Wang 00...
— In this paper, we consider the throughput modelling and fairness provisioning in CSMA/CA based ad-hoc networks. The main contributions are: Firstly, a throughput model based on...