—Distributed denial-of-service attacks (DDoS) pose an immense threat to the Internet. The most studied solution is to let routers probabilistically mark packets with partial path...
— A novel cross-layer call admission control policy is proposed for a general CDMA beamforming system. In contrast to previously proposed call admission control (CAC) policies wh...
Abstract— A Wireless Mesh Network (WMN) is being considered for commercial use in spite of several unaddressed issues. In this paper we focus on one of the most critical issues: ...
—Network coordinates (NC) system is an efficient mechanism for Internet distance prediction with limited measurements. In this paper, we identify the intrinsical cause for the i...
Yang Chen, Yongqiang Xiong, Xiaohui Shi, Beixing D...
—In this paper, we study precise localization using Angle of Arrival (AOA) estimations by smart-antenna equipped beacons in Ad-Hoc networks. The node to be localized sends a sign...
— A geometric decoding technique for finite lattices was presented by Seethaler et al. for flat-fading multiple-input multiple-output channels in the case of linear modulations...
— In Wireless Sensor Networks (WSNs), symmetric key schemes may be used to provide security. Recently, a class of random key pre-distribution techniques have been proposed and in...
— We study the problem of reliably provisioning traffic in high-capacity backbone mesh networks supporting virtual concatenation (VCAT). VCAT enables a connection to be inversel...
Ananya Das, Charles U. Martel, Biswanath Mukherjee...
Abstract— A comprehensive performance evaluation of a crosslayer solution to increase users’ downlink data rates over HSDPA is provided. The solution consists of a proxy entity...
Abstract—In this paper, we propose a new adaptive MPLSenabled micro-mobility management scheme designed to track efficiently the mobility of nodes so as to minimize both handoff...