— Most Internet telephony applications currently use either TCP or UDP to carry their voice-over-IP (VoIP) traffic. This choice can be problematic, because TCP is not well suite...
H. Vlad Balan, Lars Eggert, Saverio Niccolini, Mar...
— To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly...
— In this paper, we propose a novel asynchronous Media Access Control (MAC) protocol, Opportunistic MAC (OMAC), for Multiple Input Multiple Output (MIMO) ad-hoc networks. The pro...
Abhijeet Bhorkar, B. S. Manoj, Bhaskar D. Rao, Ram...
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Reliability and predictability of the timing behavior have shown to be major issues for wireless sensor network deployments. Real-time requirements presented by several application...