Improvements in microprocessor and networking performance have made networks of workstations a very attractive platform for high-end parallel and distributed computing. However, t...
The individual vulnerabilities of hosts on a network can be combined by an attacker to gain access that would not be possible if the hosts were not interconnected. Currently avail...
An effective approach for energy conservation in wireless sensor networks is scheduling sleep intervals for extraneous nodes, while the remaining nodes stay active to provide cont...
Multimedia traffic and real-time e-commerce applications can experience quality degradation in traditional networks such as the Internet. These difficulties can be overcome in n...
Abstract. Providing network connectivity to rural regions in the developing world is an economically challenging problem especially given the low income levels and low population d...
Shridhar Mubaraq Mishra, John Hwang, Dick Filippin...
Abstract— We study the problem of establishing secure communication channels in resource-constrained wireless networks using key predistribution. Pairwise communication channels ...
— In mobile ad hoc networks (MANETs), packets are forwarded by a series of nodes to the desired destination. Previously, we have studied the network connectivity of MANETs. In th...
Today’s Internet suffers from the problem of heterogeneity in client devices, network connectivity, content format, and users’ preferences. The framework presented in this pap...
Khalil El-Khatib, Gregor von Bochmann, Abdulmotale...
Abstract— Enhancing the connectivity of wireless sensor networks is necessary to avoid the occurrence of coverage gaps. In this paper, we aim at improving the network connectivit...
The number of edge devices connected to the Internet is increasing at a rapid rate. To maintain network connectivity, the majority of these devices remain completely powered on wh...
Karthik Sabhanatarajan, Ann Gordon-Ross, Mark Oden...