The early Web was hailed for being easy to use, and what is more important, giving people a chance to participate in its growth. The Web3D was believed to have potential to be the...
Jacek Jankowski, Izabela Irzynska, Bill McDaniel, ...
Abstract. Application layer DDoS attacks, to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols, prevent legitimate us...
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
The IEEE 802.16/WiMAX standards has fully embraced multi-antenna technology and can, thus, deliver robust performance and high transmission rates. Nevertheless, due to its inheren...
Tairan Wang, Zhifeng Tao, Andreas F. Molisch, Phil...
The computational power and sensory capabilities of mobile devices are increasing dramatically these days, rendering them suitable for real-time sound synthesis and various musica...
Yinsheng Zhou, Zhonghua Li, Dillion Tan, Graham Pe...