We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
We develop a novel auction-based algorithm to allow users to fairly compete for a wireless fading channel. We use the second-price auction mechanism whereby user bids for the chan...
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
In this paper, we investigate the timing acquisition problem for transmitted reference (TR) ultra-wideband systems employing direct-sequence (DS) spreading. We show that a two-leve...
Sandeep R. Aedudodla, Saravanan Vijayakumaran, Tan...
Today's Internet hosts are threatened by large-scale Distributed Denial-of-Service (DDoS) attacks. The Path Identification (Pi) DDoS defense scheme has recently been proposed ...
As networks grow in size and complexity, both the probability and the impact of failures increase. The pre-allocated backup bandwidth, which has been widely investigated in the lit...
- In next-generation CDMA networks, due to random user mobility and time-varying multimedia traffic activity, the system design of coverage and capacity is a challenging issue. To ...
Ching Yu Liao, Fei Yu, Victor C. M. Leung, Chung-J...
Cooperative diversity has been recently proposed as a way to form virtual antenna arrays that provide dramatic gains in slow fading wireless environments. However, most of the prop...
Aggelos Bletsas, Ashish Khisti, David P. Reed, And...