All Stories

  1. Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions
  2. Staying at the Roach Motel: Cross-Country Analysis of Manipulative Subscription and Cancellation Flows
  3. Optimal age-specific vaccination control for COVID-19: An Irish case study
  4. Adaptive password guessing: learning language, nationality and dataset source
  5. Revisiting and Revamping an IPv6 Network Telescope
  6. Log-Normal Distribution Modelling with Quantised Data
  7. Costs and Benefits of Authentication Advice
  8. Guessing PINs, One Partial PIN at a Time
  9. A Physical Layer Security (PLS) approach through Address Fed Mapping Crest Factor Reduction applicable for 5G/6G signals
  10. Fianán, Cuacha: Irish Cookie Banners
  11. A Framework to Model Bursty Electronic Data Interchange Messages for Queueing Systems
  12. Choosing Wordlists for Password Guessing: An Adaptive Multi-armed Bandit Approach
  13. Finding the Digits of the Roots of a Polynomial with Horner's Help
  14. Heads Or Tails: A Framework To Model Supply Chain Heterogeneous Messages
  15. Quantum Money Scheme
  16. On the Feasibility of Localising Smart Devices using Air Pressure
  17. Quantum Multi-factor Authentication
  18. David John Simms (1933-2018)
  19. Using machine learning to predict links and improve Steiner tree solutions to team formation problems - a cross company study
  20. Implementing a Quantum Coin Scheme
  21. Convergence of Password Guessing to Optimal Success Rates
  22. A Novel Physical Layer Authentication With PAPR Reduction Based on Channel and Hardware Frequency Responses
  23. Performance Investigation of Peak Shrinking and Interpolating the PAPR Reduction Technique for LTE-Advance and 5G Signals
  24. Using Machine Learning to Predict Links and Improve Steiner Tree Solutions to Team Formation Problems
  25. Power Saving Proxies for Web Servers
  26. Entropy Estimates for the Irish Language
  27. Peak Shrinking and Interpolating Technique for reducing Peak to Average Power Ratio
  28. A Novel Physical Layer Encryption Scheme to Counter Eavesdroppers in Wireless Communications
  29. Exploring the Impact of Password Dataset Distribution on Guessing
  30. Hello & Goodbye: Conversation Boundary Identification Using Text Classification
  31. Bundles: A Framework to Optimise Topic Analysis in Real-Time Chat Discourse
  32. Approaching incast congestion with multi-host ethernet controllers
  33. Different every time: A framework to model real-time instant message conversations
  34. Obscured by the cloud: A resource allocation framework to model cloud outage events
  35. A Lossless Network for Data Acquisition
  36. Evaluating password advice
  37. Social dogfood: A framework to minimise clouc field defects through crowd sourced testing
  38. Imola: A decentralised learning-driven protocol for multi-hop White-Fi
  39. The impact of interaction and algorithm choice on identified communities
  40. Identification and insight into a long transitory phase in random-access protocols
  41. A learning approach to decentralised beacon scheduling
  42. Analysing and Predicting the Runtime of Social Graphs
  43. Guest Editorial Power Line Communications and Its Integration With the Networking Ecosystem
  44. State of the Art in Power Line Communications: From the Applications to the Medium
  45. Learning from experience: Efficient decentralized scheduling for 60GHz mesh networks
  46. Are you being served: A framework to manage Cloud outage repair times for Small Medium Enterprises
  47. When is the right time to transmit in multi-hop White-Fi?
  48. Greener Data Exchange in the Cloud: A Coding-Based Optimization for Big Data Processing
  49. Rigorous and practical proportional-fair allocation for multi-rate Wi-Fi
  50. A lossless switch for data acquisition networks
  51. Social testing: A framework to support adoption of continuous delivery by small medium enterprises
  52. Analogues between tuning TCP for Data Acquisition and datacenter networks
  53. On efficiency and validity of previous Homeplug MAC performance analysis
  54. When priority resolution goes way too far: An experimental evaluation in PLC networks
  55. WiFo: A diagnostic tool for IEEE 802.11 MAC
  56. CodHoop: A system for optimizing big data processing
  57. Mitigating collisions through power-hopping to improve 802.11 performance
  58. Performance evaluation of the priority resolution scheme in PLC networks
  59. Bitcoin Mining and its Energy Footprint
  60. A new adaptive redundancy control algorithm for VoIP applications
  61. Improved E-model for monitoring quality of multi-party VoIP communications
  62. Power saving for web servers using proxies
  63. Welcome message from the WNM chairs
  64. Evaluation of the backoff procedure of Homeplug MAC vs. DCF
  65. H-RCA: 802.11 Collision-Aware Rate Control
  66. RT-WiFi
  67. A Comparison of RF Exposure in Macro- and Femtocells
  68. On the improvement of receiver-initiated MAC protocols for WSNs by applying scheduling
  69. Rogue femtocell owners: How Mallory can monitor my devices
  70. Rogue femtocell owners: How mallory can monitor my devices
  71. Online Estimation of VVoIP Quality-of-Experience via Network Emulation
  72. 802.11 Buffers: When Bigger Is Not Better?
  73. Monitoring VoIP call quality using improved simplified E-model
  74. Hash pile ups: Using collisions to identify unknown hash functions
  75. Experiments with radiated interference from in-home power line communication networks
  76. Exploiting the capture effect to improve WLAN throughput
  77. Decentralised learning MACs for collision-free access in WLANs
  78. Investigating the distribution of password choices
  79. Dynamics of contention free period reservation in IEEE 1901 networks
  80. WLAN channel selection without communication
  81. Addressing Slot Drift in Decentralized Collision Free Access Schemes for WLANs
  82. Supporting first person shooter games with competing traffic in 802.11e MAC
  83. Incentivising Fairness and Policing Nodes in WiFi
  84. Construction of a PLC test bed for network and transport layer experiments
  85. The 802.11g 11 Mb/s Rate is More Robust than 6 Mb/s
  86. Buffer Sizing for 802.11-Based Networks
  87. On the Validity of IEEE 802.11 MAC Modeling Hypotheses
  88. Measuring Transmission Opportunities in 802.11 Links
  89. Probabilistic approaches to cheating detection in online games
  90. EXPERIMENTAL VERIFICATION OF A RADIOFREQUENCY POWER MODEL FOR WI-FI TECHNOLOGY
  91. Optimisation of capacity in various 802.11 gaming scenarios
  92. 802.11 wireless LAN multiplayer game capacity and optimization
  93. Does every bit need the same power? An investigation on unequal power allocation for irregular LDPC codes
  94. Achieving End-to-end Fairness in 802.11e Based Wireless Multi-Hop Mesh Networks Without Coordination
  95. AMBIENT RADIOFREQUENCY POWER: THE IMPACT OF THE NUMBER OF DEVICES IN A WI-FI NETWORK
  96. Aggregation With Fragment Retransmission for Very High-Speed WLANs
  97. Inferring Queue State by Measuring Delay in a WiFi Network
  98. Complexity Attack Resistant Flow Lookup Schemes for IPv6: A Measurement Based Comparison
  99. Investigating the validity of IEEE 802.11 MAC modeling hypotheses
  100. Achieving end-to-end fairness in 802.11e based wireless multi-hop mesh networks
  101. Implementing TCP flow-level fairness using 802.11e in a multi-radio mesh testbed
  102. Spurious TCP timeouts in 802.11 networks
  103. Experimental assessment of 802.11 MAC layer channel estimators
  104. Logarithmic asymptotics for a single-server processing distinguishable sources
  105. Ambiguities in estimates of critical exponents for long-range dependent processes
  106. Experimental Implementation of Optimal WLAN Channel Selection without Communication
  107. Understanding 802.11e Voice Behaviour via Testbed Measurements and Modeling
  108. MAC Layer Channel Quality Measurement in 802.11
  109. Modeling the 802.11 Distributed Coordination Function in Nonsaturated Heterogeneous Conditions
  110. Some remarks on ld plots for heavy-tailed traffic
  111. On buffer sizing for voice in 802.11 WLANs
  112. Modeling 802.11 mesh networks
  113. Counting 6to4 relay routers
  114. A new MAC scheme for very high-speed WLANs
  115. TCP fairness in 802.11e WLANs
  116. Modeling the 802.11 distributed coordination function in non-saturated conditions
  117. Experimental evaluation of TCP performance and fairness in an 802.11e test-bed
  118. Guesswork and Entropy
  119. L 2 (R) Solutions of Dilation Equations and Fourier-Like Transforms
  120. Observations of IPv6 Addresses
  121. Experimental Evaluation of 802.11e EDCA for Enhanced Voice over WLAN Performance
  122. Improving Fairness in Multi-Hop Mesh Networks Using 802.11e
  123. Modeling 802.11e for data traffic parameter design
  124. Flow Label Filtering Feasibility
  125. Modelling 802.11 Wireless Links
  126. On Improving Voice Capacity in 802.11 Infrastructure Networks