This paper addresses issues pertaining to the necessity of utilizing formal verification methods in the design of protocols for peer-to-peer multimedia systems. These systems req...
Senem Velipasalar, Chang Hong Lin, Jason Schlessma...
RDMA reduces network latency by eliminating unnecessary copies from network interface cards to application buffers, but how to reduce memory registration cost is a challenge. Prev...
This paper deals with voice communication models for disaster area scenarios. The goal is to design models that can be used to generate realistic push to talk traffic for single ...
Nils Aschenbruck, Michael Gerharz, Matthias Frank,...
For multi-target tracking, we realize the increase in number of simultaneously trackable objects and tracking stability by improving the way of communication proposed in [1] so th...
Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to ...