• Publications
  • Influence
Bimodal multicast
TLDR
This article looks at reliability with a new goal: development of a multicast protocol which is reliable in a sense that can be rigorously quantified and includes throughput stability guarantees. Expand
  • 731
  • 64
  • PDF
Multihop-Cluster-Based IEEE 802.11p and LTE Hybrid Architecture for VANET Safety Message Dissemination
TLDR
This paper proposes a hybrid architecture VMaSC-LTE, combining IEEE 802.11p-based multihop clustering and the fourth-generation (4G) cellular system, i.e., Long-Term Evolution (LTE), with the goal of achieving a high data packet delivery ratio and low delay while keeping the usage of the cellular architecture at a minimum level. Expand
  • 271
  • 21
  • PDF
Ad-Hoc Networks
TLDR
We present a survey of epidemic algorithms for reliable multicasting in ad hoc networks and describe formulations and analytical results. Expand
  • 373
  • 5
  • PDF
Vehicle Mobility and Communication Channel Models for Realistic and Efficient Highway VANET Simulation
TLDR
We provide a realistic analysis of the VANET topology characteristics over time and space for a highway scenario using both realistic large-scale mobility traces and realistic channel models. Expand
  • 124
  • 4
  • PDF
VANET topology characteristics under realistic mobility and channel models
TLDR
We analyze VANET topology characteristics by using both realistic large-scale mobility traces and realistic channel mod- els. Expand
  • 31
  • 4
  • PDF
Epidemic-based reliable and adaptive multicast for mobile ad hoc networks
TLDR
We propose a novel bio-inspired protocol: EraMobile (Epidemic-based Reliable and Adaptive Multicast for Mobile ad hoc networks). Expand
  • 28
  • 4
  • PDF
VMaSC: Vehicular multi-hop algorithm for stable clustering in Vehicular Ad Hoc Networks
TLDR
VMaSC is a novel clustering technique based on choosing the node with the least mobility calculated as a function of the speed difference between neighboring nodes through multiple hops. Expand
  • 71
  • 3
  • PDF
FlexDPDP: Flexlist-Based Optimized Dynamic Provable Data Possession
With increasing popularity of cloud storage, efficiently proving the integrity of data stored on an untrusted server has become significant. Authenticated skip lists and rank-based authenticated skipExpand
  • 28
  • 3
  • PDF
Peer-to-peer multipoint videoconferencing on the Internet
A peer-to-peer architecture for multipoint videoconferencing is presented. Each conference participant may have asymmetric and dissimilar bandwidth connections to the Internet. The solution does notExpand
  • 32
  • 2
  • PDF
Peer-to-Peer Multipoint Video Conferencing using Layered Video
TLDR
A new peer-to-peer architecture for multipoint video conferencing that targets end points with low bandwidth network connections (single video in and out) is presented. Expand
  • 28
  • 2
  • PDF