Learn More
The routing problem in Wireless Mesh Networks is concerned with finding “good” source-destination paths. It generally faces multiple objectives to be optimized, such as i) path capacity, which accounts for the bits per second that can be sent along the path connecting the source to the destination node, and ii) end-to-end delay. This paper presents the Mesh(More)
Automatic Vehicle Identification (AVI) is a mature technology having high reliability for vehicle detection. San Antonio TransGuide recently installed a number of AVI readers alongside inductive loop detectors placed on the same freeway sections, allowing side-by-side performance comparison. The principal objective of this study is to perform a systematic(More)
The protozoan Blastocystis hominis has been considered nonpathogenic, but this classification has come under scrutiny in light of reports in the medical literature indicating it could be the cause of intestinal disorders and, in one case, hypoalbuminemia. Reported here is a severe case of infection with B. hominis that caused acute gastroenteritis with(More)
In this paper we cast DRM in a setting that allows us to model a number of current approaches as games. The DRM game is partitioned into two subgames, one that considers the game associated with content acquisition, and a second that considers how a consumer uses the content, along with a vendor's response to this usage. Examples are provided in order to(More)
We present a multi-objective optimization approach for joint throughput optimization and traffic engineering, where the routing request of traffic arrives one-by-one. We provide an Integer Linear Program (ILP) that simultaneously i) maximizes the aggregate throughput, ii) minimizes the resource consumption, and iii) minimizes the maximum link utilization.(More)
In this paper we consider some of the basic design principles that should support the development of future DRM systems. We begin by discussing some of the problems associated with current DRM environments, and how they might be alleviated through the adoption of an open architectural framework based on basic design principles. We then demonstrate a(More)
We devise a scalable and provably-secure protocol for fully-anonymous broadcast in large-scale networks. Similar to the dining cryptographers networks (DCNETS), our algorithm uses secure multi-party computation (MPC) to ensure anonymity. However, we address the weaknesses of DC-NETS, which are poor scalability and vulnerability to jamming attacks. When(More)
We address the problem of privacy in publish-subscribe(pub-sub) systems that typically expose some form of published content and subscriber interest, at least to the infrastructure responsible for subscription matching and content delivery. In our recent work, we proposed P3S, a pub-sub middleware designed to protect the privacy of subscriber interest and(More)