— This paper analyzes a trust model for mobile ad hoc networks. We provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers t...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
Mobile IPv6 (MIPv6) protocol is a new protocol designed to support the node mobility ofIPv6 protocol, which is a basic protocol of the next generation Internet. Protocol testing c...
—This paper presents VoRaQue, a software layer supporting range queries on Voronoi P2P overlays. VoRaQue maps data in a 2-dimensional space. The P2P overlay is defined by links ...
Michele Albano, Laura Ricci, Martina Baldanzi, Ran...
—This paper discusses wireless mesh network topology visualization tools and their requirements. It presents an interactive tool for visualizing mesh network topologies. The prop...
We propose efficient scheduling algorithms for downlink MIMO-CDMA systems using zero forcing beamforming to achieve high system throughput with low computational complexity. Base...
Wireless sensor networks (WSNs) have emerged as the enabling technology for a wide range of applications. In the context of environmental monitoring, especially in urban scenarios...
Giuseppe Anastasi, Marco Conti, Mario Di Francesco
Multimedia Broadcast/Multicast Service (MBMS) and High-Speed Downlink Packet Access (HSDPA) are two key technologies that constitute a significant step towards the Mobile Broadban...
Antonios G. Alexiou, Christos Bouras, Evangelos Re...
As disk drives become increasingly sophisticated and processing power increases, one of the most critical issues of designing modern disk systems is data reliability. Although num...
Kiranmai Bellam, Adam Manzanares, Xiaojun Ruan, Xi...