We present the results of a performance evaluation of link layer error recovery over wireless links. Our analysis is based upon a case study of the circuit-switched data service i...
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
—The interaction between MAC protocols and interference in wireless multi-hop networks introduces extra constraints on achievable flow rates. In this paper, we formulate an optim...
—Low-cost networked fluid flow velocity sensors are needed for high-density sampling in environmental research and other applications requiring automated fluid flow velocity mapp...
C. K. Harnett, M. T. Schueler, N. R. Blumenthal, K...
—Distributed detection of information flows spanning many nodes in a wireless sensor network is considered. In such a system, eavesdroppers are deployed near several nodes in th...