In peer-to-peer (P2P) on-demand streaming applications, multimedia content is divided into segments and peers can seek any segments for viewing at anytime. Since different segment...
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
Abstract-- Many peer-to-peer-based virtual environment (P2PVE) solutions have been proposed recently to improve the scalability of distributed virtual environment (VE) systems. By ...
Abstract--Power density and heat density of multicore processor system are increasing exponentially with Moore's Law. High temperature on chip greatly affects its reliability,...
Acoustic underwater wireless sensor networks (UWSN) have recently gained attention as a topic of research. Such networks are characterized by increased uncertainty in medium acces...
Joon Ahn, Affan A. Syed, Bhaskar Krishnamachari, J...