—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Mobility models, synthetic or trace, try to accurately model the movement of a single user or a group of users. Models are used in simulators and emulators to investigate the cons...
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Traditionally, network operators have only used simple flat-rate unlimited data plans to vie for customers. But today, with the popularity of mobile devices and exponential growt...
Soumya Sen, Carlee Joe-Wong, Sangtae Ha, Mung Chia...
— Handover of a call from wireless LAN (WLAN) to third generation cellular system and vice versa is one of the challenges faced by the integrated 3G-WLAN networks. Evolution of 3...