With the lack of admission control and resource reservation mechanisms in the Internet, overload situations can only be avoided by having the end systems deploying congestion cont...
In this work we present a prototype for simulating computer network attacks. Our objective is to simulate large networks (thousands of hosts, with applications and vulnerabilities)...
—The nodes in wireless sensor networks often collect correlated measurements. Not taking into account this information redundancy is detrimental to the network lifetime, since co...
Abstract—Dedicated Short Range Communications (DSRC)based communications enable novel automotive safety applications such as an Extended Electronic Brake Light or Intersection Co...
Kishore Ramachandran, Marco Gruteser, Ryokichi Oni...
— In this paper we use an information flow model for placement of traffic sinks in a wireless sensor network. Our mathematical model translates a communication network composed...