Information Technology, IT, may play an important part in any community as a supporting tool in the democratic process. The conditions for that to happen are primarily a genuine w...
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control (MAC) protocol. However, very little has been done on investigating the interplay betw...
— Multimedia Broadcast Multicast Service (MBMS) epitomizes the increasing popularity of enhanced end-user experience in Universal Mobile Telecommunications System (UMTS), since i...
Antonios G. Alexiou, Christos Bouras, Evangelos Re...
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Game engines of cinematic quality, broadband networking and advances in Virtual Reality (VR) technologies are setting the stage to allow players to have shared, “better-than-lif...