Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
A framework for the dynamic aggregation of ubiquitous computers is presented. The framework aggregates applications from more than one mobile component that can migrate from compu...
Future vehicular networks are expected to deploy shortrange communication technology for inter-vehicle communication. In addition to vehicle-to-vehicle communication, users will b...
We present active measurement results from a commercial IEEE 802.16/WiMAX-based network, with primary focus on TCP performance. We compare four TCP variants, namely New Reno, Cubi...
Emir Halepovic, Qian Wu, Carey L. Williamson, Maji...
— We introduce and discuss a novel link model that incorporates both uncertainty in the fading coefficients and the node distances for ad hoc networks with randomly placed nodes...