—Traceroute is widely used to report the path packets take between two internet hosts, but the widespread deployment of load balancing routers breaks a basic assumption – that ...
—This paper considers a category of rogue access points (APs) that pretend to be legitimate APs to lure users to connect to them. We propose a practical timing based technique th...
Hao Han, Bo Sheng, Chee Wei Tan, Qun Li, Sanglu Lu
— This paper presents C-MAC, a new MAC protocol designed to achieve high-throughput bulk communication for dataintensive sensing applications. C-MAC exploits concurrent wireless ...
Mo Sha, Guoliang Xing, Gang Zhou, Shucheng Liu, Xi...
—The back-pressure algorithm is a well-known throughput-optimal algorithm. However, its delay performance may be quite poor even when the traffic load is not close to network ca...
Abstract—We propose a novel search mechanism for unstructured p2p networks, and show that it is both scalable, i.e., it leads to a bounded query traffic load per peer as the pee...