— In this paper, we describe a novel localization method for ad hoc wireless sensor networks. Accurate selforganization and localization is an essential characteristic of high pe...
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
In this paper, we propose a novel framework for secure multicast on overlay networks. Our contributions are threefold: 1) a technique key composition is proposed to cope with the ...
Wireless mesh based access networks are destined to play a pivotal role in next generation broadband systems. With the proliferation of mesh networks, a key issue for network desi...
Samik Ghosh, Preetam Ghosh, Kalyan Basu, Sajal K. ...
Ethernet, which has traditionally been the dominant technology in Local Area Networks, is now facing new challenges due to the fact that networks have scaled and today’s applica...
A performance model is presented for an optical packet switch architecture in which the wavelength converters are shared per output link and each output link consists of multiple ...
Ayman G. Fayoumi, Fahad A. Al-Zahrani, Abdulgader ...
— An analytical model is proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA provides class-b...
— A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA...
This paper presents the impact of IEEE 802.15.3 MAC’s channel time allocation methods on a TCP flow’s performance. We show the importance of having super rate and appropriate...