—Enterprises are faced with the challenge of enabling IP multicast applications without exposing their network to multicast denial-of-service attacks. Current practice is to use ...
Shen Li, Vijay Sivaraman, Alex Krumm-Heller, Craig...
— This paper addresses the problem of designing a power-aware Multiple Access Control (MAC) protocol for Multihop Wireless Networks (MHWN). The problem is formulated as a cross l...
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
—A substantially long round trip time (RTT) in space channel hurts TCP interactions between the sending and receiving ends. The Consultative Committee for Space Data Systems (CCS...
—The interaction between MAC protocols and interference in wireless multi-hop networks introduces extra constraints on achievable flow rates. In this paper, we formulate an optim...