This paper examines the impact of the primary symmetric key cryptographic operation on network data streams, encryption of user data, have on the overall tra c throughput. The encr...
— This paper describes a controlled experiment of student programmers performing maintenance tasks on a C++ program. The goal of the study is to assess the maintenance size, effo...
Vu Nguyen, Barry W. Boehm, Phongphan Danphitsanuph...
This paper presents a trace-driven simulation study of two classes of retransmission timeout (RTO) estimators in the context of realtime streaming over the Internet. We explore th...
—In-network aggregation has become a promising technique for improving the energy efficiency of wireless sensor networks. Aggregating data at various nodes in the network result...
The data traffic in wireless networks for the third generation (3G) mobile telecommunication systems should take into account a variety of services (voice, data, video) and envir...