In this paper we examine the dissemination of availability reports about resources in mobile peer-topeer networks, where vehicles, pedestrian or sensors communicate with each othe...
Abstract-- We study the problem of total throughput maximization in arbitrary multi-hop wireless networks, with constraints on the total power usage (denoted by PETM), when nodes h...
Deepti Chafekar, V. S. Anil Kumar, Madhav V. Marat...
: Traffic shaping function becomes imperative for the new broadband services that are being deployed in order to avoid information loss, to provide the end users multiple traffic o...
Francis Joseph Ogwu, Mohammad Talib, Ganiyu Aderou...
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
Abstract--In this letter we discuss the exploitation of aggregated mobility patterns in mobile networks including heterogeneous multiple access techniques. We advocate the use of k...
Leonardo Badia, Nicola Bui, Marco Miozzo, Michele ...