In 802.11 managed wireless networks, the manager can address under-served links by rate-limiting the conflicting nodes. In order to determine to what extent each conflicting node ...
Eugenio Magistretti, Omer Gurewitz, Edward W. Knig...
Symbolic techniques based on Binary Decision Diagrams (BDDs) are widely employed for reasoning about temporal properties of hardware circuits and synchronous controllers. However, ...
In this paper, we present a new simulation platform for complex, radio standard spanning mobile Ad Hoc networks. SimANet - Simulation Platform for Ambient Networks - allows the coe...
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
We consider a heterogeneous swarm consisting of aerial and wheeled robots. We present a system that enables spatially targeted communication. Our system enables aerial robots to e...
Nithin Mathews, Anders Lyhne Christensen, Eliseo F...