Learn More
WANET (wireless ad hoc network) is expected to be deployed in a wide range of civil and military applications. The communicating nodes in these networks might be distributed randomly and are assumed to have packet-forwarding capability in order to communicate with each other over a shared and limited radio channel. Building such networks usually poses a(More)
—In this paper, we consider wireless ad hoc networks that use adaptive antennas and have limited energy resources. To explore the advantages of power saving offered by the use of adaptive antennas, we consider the case of source initiated multicast traffic. We present a constraint formulation for the MEM (Minimum-Energy Multicast) problem in terms of MILP(More)
—Cloud is becoming a dominant computing platform. Naturally, a question that arises is whether we can beat notorious DDoS attacks in a cloud environment. Researchers have demonstrated that the essential issue of DDoS attack and defense is resource competition between defenders and attackers. A cloud usually possesses profound resources and has full control(More)
Wireless sensor networks (WSNs) are an emerging technology for monitoring physical world. Different from the traditional wireless networks and ad hoc networks, the energy constraint of WSNs makes energy saving become the most important goal of various routing algorithms. For this purpose, a cluster based routing algorithm LEACH (low energy adaptive(More)
—Software Defined Networking (SDN) has been envisioned as the next generation network paradigm by decoupling control plane and data plane, such that network management and optimization can be conducted in a centralized manner using global network information. In this article, we study how to apply SDN concept to a wireless mesh network that has been widely(More)
—Hadoop is seriously limited by its MapReduce scheduler which does not scale well in heterogeneous environment. Heterogenous environment is characterized by various devices which vary greatly with respect to the capacities of computation and communication, architectures, memorizes and power. As an important extension of Hadoop, LATE MapRe-duce scheduling(More)
—Distributed Denial of Service (DDoS) attack is a critical threat to the Internet, and botnets are usually the engines behind them. Sophisticated botmasters attempt to disable detectors by mimicking the traffic patterns of flash crowds. This poses a critical challenge to those who defend against DDoS attacks. In our deep study of the size and organization(More)