— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
A ‘contact network’ modeling infection transmission comprises of nodes (or individuals) that are linked when they are in contact that possibly transmits an infection. We here s...
-- Networks composed of large number of nodes interacting in structured ways such as power grids, communication networks, social networks or market networks are critical port of th...
This paper presents an approach for exchanging presence information between users of an instant messaging system in a mobile ad hoc network. As major feature, presence information ...
Given the frequent topology changes in Mobile Ad Hoc Networks (MANET), the choice of appropriate broadcasting techniques is crucial to ensure reliable delivery of messages. The spr...