Abstract. Amongst the challenges of ubiquitous computing is the need to provide management support for personal wireless devices and sensors. In this extended abstract we introduce...
Naranker Dulay, Emil C. Lupu, Morris Sloman, Joe S...
—The article describes a course on system design (structural approach) which involves the following: issues of systems engineering; structural models; basic technological problem...
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Most of the current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (...
Srilatha Chebrolu, Ajith Abraham, Johnson P. Thoma...
— Healthcare and economic drivers have increased the desire to deploy systems for continuous monitoring of patients, both in hospital and outpatient settings. Such systems must o...
Stephen Strowes, Nagwa Badr, Steven Heeps, Emil Lu...