—Real time traffic adopting UDP at the transport layer needs some quality of service. It is offered through an admission control scheme. This paper adopts one such scheme which i...
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
Martin Burkhart, Mario Strasser, Dilip Many, Xenof...
An ad hoc learning-automata-based protocol for wireless LANs, capable of operating efficiently under bursty traffic conditions, is introduced. According to the proposed protocol, ...
Petros Nicopolitidis, Georgios I. Papadimitriou, A...
We consider the problem of control traffic overhead in MANETs with long-lived connections, operating under a reactive routing protocol (e.g. AODV). In such settings, control traff...
Market mechanisms have been exploited as important means for spectrum acquisition and access in cognitive radio networks. In this paper, we propose a two-tier market for decentrali...