Abstract--We propose "mode switch", an adaptive loadsensitive solution that supports both an energy-efficient operation mode for transmitting normal sensor data and an Qo...
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
—In this paper, we study the use of IEEE 802.11e for priority based safety messaging for Inter-Vehicle Communications (IVC) in Vehicular Ad-Hoc Networks (VANET). The message prio...
Abstract. We motivate in this paper the need for application-level proximity. This proximity is a function of network characteristics that decide on the application performance. Mo...
Resiliency to link failures in optical networks is becoming increasingly important due to the increasing data rate in the fiber. Path protection schemes attempt to guarantee a bac...