—The IEEE 802.16 standard, or WiMAX, has emerged to facilitate high-bandwidth wireless access in realworld metropolitan areas, commonly referred to as 4G. In WiMAX, Hybrid Automa...
The AS-level Internet topology has shown significant clustering features. In this paper, we propose a new set of clustering metrics and conduct extensive measurement on the AS-le...
Yan Li, Jun-Hong Cui, Dario Maggiorini, Michalis F...
Abstract—We study the problem of contour tracking with binary sensors, an important problem for monitoring spatial signals and tracking group targets. In particular, we track the...
Xianjin Zhu, Rik Sarkar, Jie Gao, Joseph S. B. Mit...
—For sensor networks deployed to monitor and report real events, event source anonymity is an attractive and critical security property, which unfortunately is also very difficu...
— Many tasks require multiple sensing capabilities; in Wireless Sensor Networks (WSN), it is expensive to deploy a homogeneous network wherein every sensor has the same functiona...
Xiaoming Lu, Matt Spear, Karl N. Levitt, Shyhtsun ...
—It is well known that a packet loss in 802.11 can happen either due to collision or an insufficiently strong signal. However, discerning the exact cause of a packet loss, once ...
Shravan K. Rayanchu, Arunesh Mishra, Dheeraj Agraw...
The remote file synchronization problem is how to update an outdated version of a file located on one machine to the current version located on another machine with a minimal am...
—The operation of widely-deployed random access to wireless networks is based on limited information on the result of each access attempt. When making a random access attempt, us...
Abstract—The split of a multihop, point to point TCP connection consists in replacing a plain, end-to-end TCP connection by a cascade of TCP connections. In such a cascade, conne...