To optimize network performance, cloud service providers have a number of options available to them, including co-locating production servers in well-connected Internet eXchange (...
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
This paper addresses mobility control routing in wireless networks. Given a data flow request between a sourcedestination pair, the problem is to move nodes towards the best placem...
Recently, feature maps have been applied to various problem domains.The success of some of these applications critically depends on whether feature maps are topologically ordered. ...