We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the TVA architecture which builds on capabilities. With our approach, rather than send ...
Size-based policies have been shown in the literature to effectively balance load and improve performance in cluster environments. Size-based policies assign jobs to servers based...
We present a cooperative communication scheme in which a group of receivers can collaborate to decode a message that none of the receivers can individually decode. The receivers a...
The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digi...
IEEE 802.11b wireless networks and Bluetooth networks provide complimentary services using the same unlicensed radio frequency band. As the benefits of utilizing these services bec...