The principle of least commitment was embraced early in planning research. Hierarchical task networks (HTNs)reason about high-level tasks without committing to specific low-level ...
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Nowadays, multimedia streaming is a common service on the Internet including both fixed and mobile networks. The RTP protocol is usually used to transfer the media. The RTCP protoc...
Abstract: Nowadays, in the markets of broadband access services, traditional contracts are of "static" type. Customers buy the right to use a specific amount of resources...
Sergios Soursos, Costas Courcoubetis, Richard R. W...
TCP-based data flows generate packets and ACKs in two directions, be it in the wireline or wireless networks. In the latter case, packets are typically found in the downlink where...