Abstract—This paper presents an analytic framework to evaluate the performance of peer to peer (P2P) networks. Using the time to download or replicate an arbitrary file as the m...
—We consider surveillance applications in which sensors are deployed in large numbers to improve coverage fidelity. Previous research has studied how to select active sensor cov...
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
—The cognitive radio based IEEE 802.22 wireless regional area network (WRAN) is designed to operate in the under–utilized TV bands by detecting and avoiding primary TV transmis...
Shamik Sengupta, R. Chandramouli, Swastik Brahma, ...
Examining the validity or accuracy of proposed available bandwidth estimation tools remains a challenging problem. A common approach consists of evaluating a newly developed tool ...