We consider multi-rate peer-to-peer multi-party conferencing applications, where different receivers in the same group can receive videos at different rates using, for example, sc...
Miroslav Ponec, Sudipta Sengupta, Minghua Chen, Ji...
Abstract--Computer-centered services and broadband wireless connectivity are enabling the delivery of multimedia-based entertainment from the Internet to in-house wireless devices ...
Claudio E. Palazzi, Nicola Stievano, Marco Roccett...
Abstract—Tor is a well-known low-latency anonymous communication system. To prevent the traffic analysis attack, Tor packs application data into equal-sized cells. However, we f...
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
1 Routers need buffers to store and forward packets, especially when there is network congestion. With current memory technology, neither the SRAM nor the DRAM alone is suitabl...