This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
Most of the existing medium access control (MAC) protocols for wireless local area networks (WLANs) provide prioritized access by adjusting the contention window sizes or interfram...
—This paper deals with a simple but essential two-hop wireless relay network employing network coding and a slotted ALOHA protocol. Network coding is a recent and highly regarded...
Using directional antennas in wireless ad hoc networks can significantly improve network performance. However, the deafness problem greatly limits the network performance. This pa...
The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an interesting ...
Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, ...