In this paper we discuss some issues arising from our implementation and evaluation of two systems that enable mobile phone users to identify common address book contacts. These s...
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous rou...
This paper investigates wireless sensor networks where a small percentage of nodes are assumed to know their location a priori. These reference nodes enable absolute localization ...
— While queue capacities have a direct impact on loss and latency during congestion, and wireless networks continue to spread in university, corporate and home networks, little i...
Feng Li, Mingzhe Li, Rui Lu, Huahui Wu, Mark Clayp...
The increasing reliance of users on wireless networks for Internet connectivity has posed two significant challenges for mobile networking research. The first challenge is to pr...