— This paper presents the ALCA (Asymmetric Link Collision Avoidance) protocol. ALCA was designed to deal with a known deficiency of the Basic Scheme [1] for power control in 802...
Patients do considerable information work. Technologies that help patients manage health information so they can play active roles in their health-care, such as personal health re...
Predrag V. Klasnja, Andrea Civan-Hartzler, Kenton ...
Visualization has a relevant role in almost every domain of computer applications. It is thus natural to think about bringing visualization techniques to mobile devices (such as P...
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
Information warfare has surfaced as an emerging concept that affects not only military institutions but ordinary organisations as well. Information warfare in itself consists of v...