The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...
Two common tools in Linux- and UNIX-based environments are SSH for secure communications and sudo for performing administrative tasks. These are independent programs with substant...
We analyze the problem of reducing packet losses due to the authentication time which is required when an ad hoc node switches across different gateways in a mobile ad hoc network...
The InfiniBandTM Architecture (IBA) is a new promising I/O communication standard positioned for building clusters and System Area Networks (SANs). However, the IBA specification ...
To be an effective platform for performance-sensitive realtime systems, commercial-off-the-shelf (COTS) distributed object computing (DOC) middleware must support application qual...
Carlos O'Ryan, Douglas C. Schmidt, Fred Kuhns, Mar...