Checksum and CRC algorithms have historically been studied under the assumption that the data fed to the algorithms was uniformly distributed. This paper examines the behavior of ...
A mobile user location management mechanism is introduced that incorporates a distance based location update scheme and a paging mechanism that satises predened delay requiremen...
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of t...
Reliable multicast communication is important in large-scale distributed applications. For example, reliable multicast is used to transmit terrain and environmental updates in dis...
Hugh W. Holbrook, Sandeep K. Singhal, David R. Che...