—In this paper, we consider an interworking architecture of wireless mesh backbone and propose an effective vertical handoff scheme between 802.11 and 802.16 wireless access netw...
—The already severe inefficiency problem in running VoIP on the IEEE 802.11-based wireless LAN is exacerbated in multi-hop networks due to spatial interference. This paper prese...
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches ...
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
This paper presents a determinacy inference analysis for logic programs. The analysis infers determinacy conditions that, if satisfied by a call, ensures that it computes at most ...