Experimental activities play a vital role in the deployment and development of novel radio access networks. In particular the movement from 3G to 4G poses new challenges, which ne...
Pablo Vidales, Glenford E. Mapp, Frank Stajano, Jo...
If we expect the computer to vanish in the background, to make pervasive computing a reality, first we must be able to provide the illusion that all the user’s computers, devic...
Francisco J. Ballesteros, Gorka Guardiola, Enrique...
Petri net faulty models are useful for reliability analysis and fault diagnosis of discrete event systems. Such models are difficult to work out as long as they must be computed ac...
Edouard Leclercq, Souleiman Ould el Medhi, Dimitri...
— We investigate a technique that uses an embedded network deployed pervasively throughout an environment to aid robots in navigation. First, we show that the path computed by th...
Keith J. O'Hara, Victor Bigio, Shaun Whitt, Daniel...
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...