While standardization efforts for XML query languages have been progressing, researchers and users increasingly focus on the database technology that has to deliver on the new cha...
Albrecht Schmidt 0002, Florian Waas, Martin L. Ker...
Abstract—This paper investigates pricing of Internet connectivity services in the context of a monopoly ISP selling broadband access to consumers. We first study the optimal com...
Prashanth Hande, Mung Chiang, A. Robert Calderbank...
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
This article presents the findings of an action research study in which a repeatable GSS (Group Support System) process was adopted by project teams to track their progress. The r...
Fang Chen, Robert O. Briggs, Gail Corbitt, Jay F. ...
Simulation is widely used for performance analysis of Personal Communication Systems due to their inherent complexity. However, resource demands (cpu-time and memory requirements)...