All Stories

  1. Staying at the Roach Motel: Cross-Country Analysis of Manipulative Subscription and Cancellation Flows
  2. Optimal age-specific vaccination control for COVID-19: An Irish case study
  3. Adaptive password guessing: learning language, nationality and dataset source
  4. Revisiting and Revamping an IPv6 Network Telescope
  5. Log-Normal Distribution Modelling with Quantised Data
  6. Costs and Benefits of Authentication Advice
  7. Guessing PINs, One Partial PIN at a Time
  8. A Physical Layer Security (PLS) approach through Address Fed Mapping Crest Factor Reduction applicable for 5G/6G signals
  9. Fianán, Cuacha: Irish Cookie Banners
  10. A Framework to Model Bursty Electronic Data Interchange Messages for Queueing Systems
  11. Choosing Wordlists for Password Guessing: An Adaptive Multi-armed Bandit Approach
  12. Finding the Digits of the Roots of a Polynomial with Horner's Help
  13. Heads Or Tails: A Framework To Model Supply Chain Heterogeneous Messages
  14. Quantum Money Scheme
  15. On the Feasibility of Localising Smart Devices using Air Pressure
  16. Quantum Multi-factor Authentication
  17. David John Simms (1933-2018)
  18. Using machine learning to predict links and improve Steiner tree solutions to team formation problems - a cross company study
  19. Implementing a Quantum Coin Scheme
  20. Convergence of Password Guessing to Optimal Success Rates
  21. A Novel Physical Layer Authentication With PAPR Reduction Based on Channel and Hardware Frequency Responses
  22. Performance Investigation of Peak Shrinking and Interpolating the PAPR Reduction Technique for LTE-Advance and 5G Signals
  23. Using Machine Learning to Predict Links and Improve Steiner Tree Solutions to Team Formation Problems
  24. Power Saving Proxies for Web Servers
  25. Entropy Estimates for the Irish Language
  26. Peak Shrinking and Interpolating Technique for reducing Peak to Average Power Ratio
  27. A Novel Physical Layer Encryption Scheme to Counter Eavesdroppers in Wireless Communications
  28. Exploring the Impact of Password Dataset Distribution on Guessing
  29. Hello & Goodbye: Conversation Boundary Identification Using Text Classification
  30. Bundles: A Framework to Optimise Topic Analysis in Real-Time Chat Discourse
  31. Approaching incast congestion with multi-host ethernet controllers
  32. Different every time: A framework to model real-time instant message conversations
  33. Obscured by the cloud: A resource allocation framework to model cloud outage events
  34. A Lossless Network for Data Acquisition
  35. Evaluating password advice
  36. Social dogfood: A framework to minimise clouc field defects through crowd sourced testing
  37. Imola: A decentralised learning-driven protocol for multi-hop White-Fi
  38. The impact of interaction and algorithm choice on identified communities
  39. Identification and insight into a long transitory phase in random-access protocols
  40. A learning approach to decentralised beacon scheduling
  41. Analysing and Predicting the Runtime of Social Graphs
  42. Guest Editorial Power Line Communications and Its Integration With the Networking Ecosystem
  43. State of the Art in Power Line Communications: From the Applications to the Medium
  44. Learning from experience: Efficient decentralized scheduling for 60GHz mesh networks
  45. Are you being served: A framework to manage Cloud outage repair times for Small Medium Enterprises
  46. When is the right time to transmit in multi-hop White-Fi?
  47. Greener Data Exchange in the Cloud: A Coding-Based Optimization for Big Data Processing
  48. Rigorous and practical proportional-fair allocation for multi-rate Wi-Fi
  49. A lossless switch for data acquisition networks
  50. Social testing: A framework to support adoption of continuous delivery by small medium enterprises
  51. Analogues between tuning TCP for Data Acquisition and datacenter networks
  52. On efficiency and validity of previous Homeplug MAC performance analysis
  53. When priority resolution goes way too far: An experimental evaluation in PLC networks
  54. WiFo: A diagnostic tool for IEEE 802.11 MAC
  55. CodHoop: A system for optimizing big data processing
  56. Mitigating collisions through power-hopping to improve 802.11 performance
  57. Performance evaluation of the priority resolution scheme in PLC networks
  58. Bitcoin Mining and its Energy Footprint
  59. A new adaptive redundancy control algorithm for VoIP applications
  60. Improved E-model for monitoring quality of multi-party VoIP communications
  61. Power saving for web servers using proxies
  62. Welcome message from the WNM chairs
  63. Evaluation of the backoff procedure of Homeplug MAC vs. DCF
  64. H-RCA: 802.11 Collision-Aware Rate Control
  65. RT-WiFi
  66. A Comparison of RF Exposure in Macro- and Femtocells
  67. On the improvement of receiver-initiated MAC protocols for WSNs by applying scheduling
  68. Rogue femtocell owners: How Mallory can monitor my devices
  69. Rogue femtocell owners: How mallory can monitor my devices
  70. Online Estimation of VVoIP Quality-of-Experience via Network Emulation
  71. 802.11 Buffers: When Bigger Is Not Better?
  72. Monitoring VoIP call quality using improved simplified E-model
  73. Hash pile ups: Using collisions to identify unknown hash functions
  74. Experiments with radiated interference from in-home power line communication networks
  75. Exploiting the capture effect to improve WLAN throughput
  76. Decentralised learning MACs for collision-free access in WLANs
  77. Investigating the distribution of password choices
  78. Dynamics of contention free period reservation in IEEE 1901 networks
  79. WLAN channel selection without communication
  80. Addressing Slot Drift in Decentralized Collision Free Access Schemes for WLANs
  81. Supporting first person shooter games with competing traffic in 802.11e MAC
  82. Incentivising Fairness and Policing Nodes in WiFi
  83. Construction of a PLC test bed for network and transport layer experiments
  84. The 802.11g 11 Mb/s Rate is More Robust than 6 Mb/s
  85. Buffer Sizing for 802.11-Based Networks
  86. On the Validity of IEEE 802.11 MAC Modeling Hypotheses
  87. Measuring Transmission Opportunities in 802.11 Links
  88. Probabilistic approaches to cheating detection in online games
  89. EXPERIMENTAL VERIFICATION OF A RADIOFREQUENCY POWER MODEL FOR WI-FI TECHNOLOGY
  90. Optimisation of capacity in various 802.11 gaming scenarios
  91. 802.11 wireless LAN multiplayer game capacity and optimization
  92. Does every bit need the same power? An investigation on unequal power allocation for irregular LDPC codes
  93. Achieving End-to-end Fairness in 802.11e Based Wireless Multi-Hop Mesh Networks Without Coordination
  94. AMBIENT RADIOFREQUENCY POWER: THE IMPACT OF THE NUMBER OF DEVICES IN A WI-FI NETWORK
  95. Aggregation With Fragment Retransmission for Very High-Speed WLANs
  96. Inferring Queue State by Measuring Delay in a WiFi Network
  97. Complexity Attack Resistant Flow Lookup Schemes for IPv6: A Measurement Based Comparison
  98. Investigating the validity of IEEE 802.11 MAC modeling hypotheses
  99. Achieving end-to-end fairness in 802.11e based wireless multi-hop mesh networks
  100. Implementing TCP flow-level fairness using 802.11e in a multi-radio mesh testbed
  101. Spurious TCP timeouts in 802.11 networks
  102. Experimental assessment of 802.11 MAC layer channel estimators
  103. Logarithmic asymptotics for a single-server processing distinguishable sources
  104. Ambiguities in estimates of critical exponents for long-range dependent processes
  105. Experimental Implementation of Optimal WLAN Channel Selection without Communication
  106. Understanding 802.11e Voice Behaviour via Testbed Measurements and Modeling
  107. MAC Layer Channel Quality Measurement in 802.11
  108. Modeling the 802.11 Distributed Coordination Function in Nonsaturated Heterogeneous Conditions
  109. Some remarks on ld plots for heavy-tailed traffic
  110. On buffer sizing for voice in 802.11 WLANs
  111. Modeling 802.11 mesh networks
  112. Counting 6to4 relay routers
  113. A new MAC scheme for very high-speed WLANs
  114. TCP fairness in 802.11e WLANs
  115. Modeling the 802.11 distributed coordination function in non-saturated conditions
  116. Experimental evaluation of TCP performance and fairness in an 802.11e test-bed
  117. Guesswork and Entropy
  118. L 2 (R) Solutions of Dilation Equations and Fourier-Like Transforms
  119. Observations of IPv6 Addresses
  120. Experimental Evaluation of 802.11e EDCA for Enhanced Voice over WLAN Performance
  121. Improving Fairness in Multi-Hop Mesh Networks Using 802.11e
  122. Modeling 802.11e for data traffic parameter design
  123. Flow Label Filtering Feasibility
  124. Modelling 802.11 Wireless Links
  125. On Improving Voice Capacity in 802.11 Infrastructure Networks