Typical IT Environments of medium to large size organizations consist of tens of networks that connect hundreds of servers to support the running of a large variety of business-re...
Hady S. AbdelSalam, Kurt Maly, Ravi Mukkamala, Moh...
The aim of this paper is to show some solutions for key management in ad hoc networks. The major problem in providing security services in such infrastructure less networks is how...
Energy is a scarce resource in ad hoc mobile networks, making energy-aware communication crucial. In the absence of a central controlling entity and due to its dynamic network top...
In wireless sensor networks, hello protocols for neighbor discovery are a basic service offered by the networking stack. However, their study usually rely on rather simplistic mo...
—We extend the existing network utility maximization (NUM) framework for wired networks to wireless sensor networks by formulating it in order to take into account interference a...
George Tichogiorgos, Kin K. Leung, Archan Misra, T...