— 802.11 usage has exploded and broken all barriers for which it was originally proposed. This has resulted in research for its non-legacy usages. Such usages require study of pa...
— We consider applications of sensor networks wherein data packets generated by every node have to reach the base station. This results in a many-to-one communication paradigm re...
— In this paper, we model and characterize the performance of multihop radio networks in the presence of energy constraints, and design routing algorithms to optimally utilize th...
— A streaming system based on the Scalable Video Coding (SVC) extension of H.264/AVC is shown. SVC allows for data rate adaptation without re-encoding just by dropping packets of...
Thomas Schierl, Cornelius Hellge, Shpend Mirta, Ka...
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...