In this paper, we propose and analyze a multicast application called SOMA (SynchrOnous Multicast Application) which offers multicast file transfer service in an asymmetric intra-ca...
Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnou...
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
For multimedia senders to benefit the most of dynamically changing availability of network resources they need to adjust their transmission behavior in accordance with the network...
In nowadays wireless networks, mobile users frequently access Internet services that are often based on information concerning the application context and service status. In prese...
—The concept of cooperative relaying promises gains in robustness and energy-efficiency in wireless networks. Although protocols for cooperative relay selection were proposed re...
Helmut Adam, Christian Bettstetter, Sidi-Mohammed ...