Abstract. Random key pre-distribution schemes are vulnerable to collusion attacks. In this paper, we propose a new key management scheme for ubiquitous heterogeneous sensor network...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...
In this paper, we propose a stochastic rate control method to provide seamless video streaming for vertical handoff between WLAN and 3G cellular network. In the proposed method, w...
Jae-Woong Yun, Hye-Soo Kim, Jae-Won Kim, Youn-Seon...
The goal of this research is to develop performance profiles of parallel and distributed applications in order to predict their execution time under different network conditions....
TCP(α,β) protocols trade the congestion window increase value α for the decrease ratio β , to generate smoother traffic patterns and to maintain a friendly behavior. In this p...
In this paper, we consider social peer-to-peer (P2P) networks, where peers are sharing their resources (i.e., multimedia content and upload bandwidth). In the considered P2P netwo...