This research is motivated by the needs of robust streaming of vector graphics contents over the Internet, wireless and other lossy networks. We present a multiple description cod...
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
In this paper, we present a real application system based on wireless sensor network (WSN) for fence surveillance which is implemented on our development platform for WSN, called ...
Youngsoo Kim, Jonggu Kang, Daeyoung Kim, Eunjo Kim...
This study reports on several typical scenarios of the use of email notification interface agents under the influence of critical incidents. An interface agent is a reactive, coll...
When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...