Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
The WeSpace is a long-term project dedicated to the creation of environments supporting walkup and share collaboration among small groups. The focus of our system design has been ...
Hao Jiang, Daniel Wigdor, Clifton Forlines, Chia S...
Research on TCP performance relies either on simulation programs, which run on a single machine, or on the use of real testbeds, where different machines represent different netwo...
Carlo Caini, Rosario Firrincieli, Renzo Davoli, Da...
The WiMAX Reference Network Architecture can be used in point-to-point and point-to-multipoint network topologies, and is suitable for providing last-mile, building-to-building, a...
Kostas Pentikousis, Esa Piri, Jarno Pinola, Frerk ...
—Metropolitan wireless mesh networks are being deployed to provide broadband connectivity to city-wide hotspots. However, its commercial feasibility and business model have not y...