Abstract. A major challenge in pervasive computing is to learn activity patterns, such as bathing and cleaning from sensor data. Typical sensor deployments generate sparse datasets...
Network traces of Internet attacks are among the most valuable resources for network analysts and security researchers. However, organizations and researchers are usually reluctan...
— In this paper, we propose an application-driven MAC-layer buffer management framework based on a novel Active Dropping (AD) mechanism for real-time video streaming in IEEE 802....
Recent development in tethered airfoil i.e. kite technology allows the possibility of exploitation of wind energy at higher altitudes than achievable with traditional wind turbines...
The next-generation social communication medium, teleimmersion, is receiving increasing attention from both the research and industrial communities. It enables interaction between...