Future wireless internet enabled devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although SoCs offer more resi...
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Evaluating and comparing the quality of surface interpolants is an important problem in computer graphics, computer aided geometric design and scienti c visualization. We introduc...
Suresh K. Lodha, Robert E. Sheehan, Alex Pang, Cra...
The ns-2 simulator has limited support for simulating 802.11based wireless mesh networks. We have added the following new features at the MAC and PHY layer of ns-2: (i) cumulative...
International and intercultural collaborations provide a unique opportunity to explore cultural differences in the usage and appropriation of a technology. Mobile photo capture an...
Nirmal J. Patel, James Clawson, Namwook Kang, Seun...