This paper introduces a novel feedback arrangement, termed re-feedback. It ensures metrics in data headers such as time to live and congestion notification will arrive at each re...
Bob Briscoe, Arnaud Jacquet, Carla Di Cairano-Gilf...
Distributed embedded sensor networks are now being successfully deployed in environmental monitoring of natural phenomena as well as for applications in commerce and physical secu...
Richard Pon, Maxim A. Batalin, Mohammad H. Rahimi,...
The applications in many scientific fields, like bioinformatics and high-energy physics etc, increasingly demand the computing infrastructures can provide more computing power and...
Xiaohui Wei, Zhaohui Ding, Wilfred W. Li, Osamu Ta...
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
— One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechani...