Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
So far we have developed a disaster information network which is very effective and robust using wireless network. In this paper, we introduce a mobile network for disaster commun...
The design and development process of communication protocols and real-time systems and particularly transport protocol mechanisms requires adequate methodology and efficient ins...
—Code updates, such as those for debugging purposes, are frequent and expensive in the early development stages of wireless sensor network applications. We propose AdapCode, a re...
I-Hong Hou, Yu-En Tsai, Tarek F. Abdelzaher, Indra...
While extensive efforts have been devoted to providing optimization based, distributed congestion control schemes for efficient bandwidth utilization and fair allocation in both ...