In this paper, we propose a new scalable application-layer protocol, specifically designed for data streaming applications with large client sets. This is based upon a control hie...
Panayotis E. Fouliras, Spiros Xanthos, Nikolaos Ts...
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
We present an integrated dual approach to reduce power consumption in infrastructure-mode 802.11 wireless LANs. A novel distributed power control algorithm adaptively adjusts the ...
An ID recognition system is described that uses optical beacons and a high-speed image sensor. The ID sensor captures a scene like an ordinary camera and recognizes the ID of a be...
Many Layered Multicast (LM) congestion control schemes have been proposed to serve different users with heterogeneous bandwidth requirements. Most of the LM algorithms suffer from...
Li Zhu, Nirwan Ansari, Zafer Sahinoglu, Anthony Ve...