We analyze and present different strategies to adapt the load in transactional memory systems based on contention. Our experimental results show a substantial overall improvement ...
David Hasenfratz, Johannes Schneider, Roger Watten...
In wireless sensor networks, multi-hop localization schemes are very vulnerable to various attacks such as wormholes and range modification attacks. In this paper, we propose a rob...
Network Coding (NC) can be efficiently combined with the "physical layer broadcast" property of wireless mediums to facilitate mutual exchange of independent information...
Wireless operators incorporate multiradio access technologies aiming at expanding their customer base and benefiting from synergies of existing and planned infrastructure. The res...
This paper compares, through analysis and simulation, a number of multichannel MAC protocols for wireless networks. We first classify these protocols into 4 categories based on t...
Jeonghoon Mo, Hoi-sheung Wilson So, Jean C. Walran...