Large-scale sensor networks impose energy and communication constraints, thus it is difficult to collect data from each individual sensor node and process it at the sink. In this ...
Xiaoqiao Meng, Thyaga Nandagopal, Li Li, Songwu Lu
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
: The development and deployment of interconnected networks is being increasingly limited by their complexity and the concomitant cost of managing the operational network. Autonomi...
David Lewis, Declan O'Sullivan, Ruaidhri Power, Jo...
— This paper proposes a two-layer Joint Radio Resource Management (JRRM) framework to improve the efficiency in multi-radio and multi-operator cellular scenarios. On the one hand...
A good understanding of contact patterns in delay tolerant networks (DTNs) is essential for the design of effective routing schemes. Prior work has typically focused on intercontac...