Abstract— Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition t...
Wireless mesh networks (WMNs) have been proposed as a solution for ubiquitous last-mile broadband access. A critical limiting factor for many WMN protocols in realizing their thro...
Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charl...
Abstract. We present results from a series of experiments, where relevant factors for the use of path prepositions were examined. We were especially interested in the concepts behi...
In personal communications applications, users communicate via wireless with a wireline network. The wireline network tracks the current location of the user, and can therefore ro...
Upamanyu Madhow, Michael L. Honig, Kenneth Steigli...
: We study mobile P2P content dissemination schemes which leverage the local dedicated caches provided by hand-held devices (e.g., smart-phones, PDAs) and opportunistic contacts be...