This paper introduces a serious security problem that people believe has been fixed, but which is still very much existing and evolving, namely evasions. We describe how protocols...
With the rapid growth of data centers, minimizing the queueing delay at network switches has been one of the key challenges. In this work, we analyze the shortcomings of the curre...
The current generation of protocol architectures, such as TCP/IP or the IS0 suite, seem successful at meeting the demands of todays networks. However, a number of new requirements...
Emerging indoor mobile computing environments seek to provide a user with an advanced setofcommunication-intensive applications, which require sustained quality of service in the ...
In this paper, we describe the opportunistic localization, which enables localization services that works seamlessly in heterogeneous environments including indoors as oppose to G...
Martin Klepal, Maarten Weyn, Warsun Najib, Inge By...