Two schools of thoughts have emerged over the recent debate on internet router buffer sizing. One school argues that the presence of a large number of flows leads to traffic desync...
Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is...
Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Wo...
This paper introduces a framework for in-field-maintenance services for wireless sensor networks. The motivation of this work is driven by an observation that many applications usi...
SOAP is an XML-based protocol that is widely used in Web services and that provides extensibility, portability, flexibility, and descriptiveness. Unfortunately, these attractive c...
Nayef Abu-Ghazaleh, Michael J. Lewis, Madhusudhan ...
Abstract Browsing and visualizing large datasets is often a tedious chore. Locating features, especially in a wavelet transform domain is usually offered as a possible solution. W...
Bala Krishna Nakshatrala, David Thompson, Raghu Ma...