Abstract—Many routing protocols have been proposed for wireless ad hoc networks, and most of them are based on some variants of flooding. Thus many routing messages are propagat...
Tactical and operational planning for manufacturing enterprises are more important today than ever before as their supply chains span the globe. Two state-of-the-art technologies ...
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
Abstract--This paper is concerned with the networked synchronization control problem of coupled dynamic networks (CDNs) with time-varying delay. First, both the data packet dropout...
In this paper, we propose a transrating based video rate adaptation technique for compressed high-definition video transmission over wireless local area networks. Our application ...