Cognitive radios permit dynamic control of physical layer resources such as transmission power and constellation size; these degrees of freedom can be employed to achieve significa...
Alex Fridman, Steven Weber, Kapil R. Dandekar, Mos...
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
Abstract--In this work, we address the performance problems that arise when unicast security protocols IPSEC and SSL are applied for securing the end-to-end communication in hybrid...
This study deals with the Delay-Constrained Minimum Cost Loop Problem (DC-MCLP) of finding several loops from a source node. The DC-MCLP consists of finding a set of minimum cost ...
Abstract. Wireless Sensor Networks (WSNs) have been widely used in motoring and collecting interests of environment information. Packet flooding or broadcasting is an essential fun...