It is well known that TCP does not fully utilize the available bandwidth in fast long-distance networks. This paper proposes S-shaped TCP (SS-TCP). Th...
One of severe security threats in wireless sensor network is node compromise. A compromised node can easily inject false data reports on the events th...
In this paper, we propose an e.cient non-linear task workload prediction mechanism incorporated with a fair scheduling algorithm for task allocation a...
Much e.ort has been spent in analyzing and modeling IP tra.c from the perspective of the packet-counting process that aggregates packet arrivals over...
It is an important issue to provide the reliability as well as to balance the tra.c load for the multihomed networks. In this paper, we deal with two...