Recently, several directional MAC protocols using smart antennas or directional antennas have been proposed for wireless ad hoc networks including our proposed MAC protocol called...
Recent research results show that a wireless ad hoc network can exploit controlled node mobility to reduce communication energy consumption. Node movement, however, may consume a ...
Publish/subscribe is emerging as an appropriate communication paradigm for large-scale, widely-distributed systems. In this paper, we describe our work on integrating active datab...
Capacity estimation is an important part of covert channel analysis. It measures the severity of a covert channel by estimating the maximum information rate attainable over it. Tr...
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...