Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
Abstract--Interference between nodes directly limits the capacity of mobile ad hoc networks. This paper focuses on spatial interference cancelation with perfect channel state infor...
Kaibin Huang, Jeffrey G. Andrews, Robert W. Heath ...
Wireless networks introduce brand new opportunities for music delivery. The trend of using mobile devices in wireless networks, can significantly extent the recent change of paradi...
Ioannis Karydis, Alexandros Nanopoulos, Apostolos ...
? Peer-to-peer is a popular distributed system. With the advancement in mobile technologies, mobile p2p has revealed its attraction. But, the resource constraints such as bandwidth...
Delay tolerant networks (DTNs) are a kind of wireless mobile network which may lack continuous network connectivity. Multicast supports the distribution of data to a group of users...