It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security sc...
Layer 2 traceback is an important component of end-toend packet traceback. Whilst IP traceback identiļ¬es the origin network, L2 traceback extends the process to provide a more ļ...
Abstract. In this paper, we examine the performance of speciļ¬c implementations of multiple description coding and of layered coding for video streaming over error-prone packet sw...
A novel efficiency and effectiveness Internet multicast routing protocol is presented with short delay, high throughput, resource utilization and scalability for a single multicas...
We evaluate several routing protocols for mobile, wireless, ad hoc networks via packet level simulations. The protocol suite includes routing protocols specifically designed for a...