In this paper, we study the fundamental properties of broadcasting in multi-hop wireless networks. Previous studies have shown that, as long as broadcast capacity is concerned, asy...
— Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely ...
By allowing end hosts to make routing decisions at the application level, different overlay networks may unintentionally interfere with each other. This paper describes how multip...
We consider the process of cleaning a network where at each time step, all vertices that have at least as many brushes as incident, contaminated edges, send brushes down these edg...
Serge Gaspers, Margaret-Ellen Messinger, Richard J...
— In this paper, we propose an application-driven MAC-layer buffer management framework based on a novel Active Dropping (AD) mechanism for real-time video streaming in IEEE 802....