Learn More
Most mobile devices today are equipped with multiple and heterogeneous wireless interfaces. In this paper we ask the following question: <i>what is the best approach to leverage the multiple interfaces available at a mobile device in terms of the performance delivered to the user?</i> In answering the question we argue that simple "bandwidth aggregation"(More)
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches focus on hiding the meaning of the information being communicated from the eavesdropper, we consider a complimentary class of strategies that limit knowledge of the existence of(More)
In this paper, we study the impact of node mobility on link duration in multi-hop mobile networks. In multi-hop mobile networks, each node is free to move, and each link is established between two nodes. A link between two nodes is established when one node enters the transmission range of the other node, and the link is broken when either node leaves the(More)
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers by using smart antennas. While conventional cryptography-based approaches focus on hiding the meaning of the information being communicated from the eavesdropper, we consider a complimentary class of strategies that limit knowledge of the existence of(More)
While a remote computing solution such as VNC is an effective technology for PC users to access a remote computer, it is not as effective while being used from smartphones. In this paper, we propose techniques to improve remote computing from smartphones that help deliver near-PC level experience to users. We introduce a key building block called(More)
In this paper, we model the epoch distance of the random waypoint model in mobile ad hoc networks. In the random waypoint model, each node selects a target location (i.e., waypoint) to move at a speed selected from an interval. Once the target is reached, the node pauses for a random time and then selects another target with another speed to move again. The(More)