We consider an ad-hoc wireless network operating within a free market economic model. Users send data over a choice of paths, and scheduling and routing decisions are updated dyna...
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Shortest path computation is one of the most common queries in location-based services that involve transportation networks. Motivated by scalability challenges faced in the mobil...
The integration of different wireless access technologies combined with the huge characteristic diversity of supported services in next-generation wireless systems creates a real h...
This paper presents a novel motion detection scheme by using the Momentum of Received Signal Strength (MRSS) to improve the quality of handoff in a general wireless network. MRSS ...
Tein-Yaw Chung, Chih-Hung Hsu, Yung-Mu Chen, K. Ro...