—Large scale market penetration of electronic devices equipped with Bluetooth technology now gives the ability to share content (such as music or video clips) between members of ...
— Wireless networks are susceptible to accidental or intentional radio interference. One way to cope with this threat is to have the radios compete with the jammer, whereby the n...
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Abstract— Body sensor networks consisting of low-power onbody wireless sensors attached to mobile users will be used in the future to monitor the health and well being of patient...
Sye Loong Keoh, Naranker Dulay, Emil Lupu, Kevin P...
— The age of technology has changed the way that surgeons are being trained. Traditional methodologies for training can include lecturing, shadowing, apprenticing, and developing...
Abstract— Large-scale ubiquitous computing environments require scalable and robust service discovery to enable “anytime, anywhere” computing, which is hard to be satisfied ...
Client side caching of location dependent queries is an important technique for improving performance of location-based services. Most of the existing research in this area has fo...