A number of recent technological trends have made data intensive applications such as continuous media (audio and video) servers a reality. These servers store and retrieve a larg...
Digital pen systems, originally designed to digitize annotations made on physical paper, are evolving to permit a wider variety of applications. Although the type and quality of p...
Hyunyoung Song, Tovi Grossman, George W. Fitzmauri...
Wireless sensor networks have traditionally focused on low duty-cycle applications where sensor data are reported periodically in the order of seconds or even longer. This is due ...
Rahul Mangharam, Anthony Rowe, Raj Rajkumar, Ryohe...
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
In this paper the behavior of the upcoming MAC protocol for wireless LANs IEEE 802.11e is investigated. Based on the results, we propose an enhancement for Hybrid Coordination Fun...
Balasubramanian Appiah Venkatakrishnan, S. Selvake...