—This paper charts the course of adaptive behavior in intrusion tolerance, starting from pre-programmed and usercontrolled reactive adaptation to highly sophisticated autonomic a...
Data-intensive applications that operate on large volumes of data have motivated a fresh look at the design of data center networks. The first wave of proposals focused on designi...
Guohui Wang, David G. Andersen, Michael Kaminsky, ...
—Current 802.11 networks do not typically achieve the maximum potential throughput despite link adaptation and crosslayer optimization techniques designed to alleviate many cause...
—This contribution is attempting to show how a route diversity can improve the traffic behavior of a connection between two network entities. The most used transmission protocol...
Sensors are tiny computers with limited computational capability and physical resources. The implementation of secure protocols for sensor network is a big challenge. In order to ...
Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradfor...