There exist a wide variety of network design problems that require a traffic matrix as input in order to carry out performance evaluation. The research community has not had at it...
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
We introduce iPoint, a passive device that can interact and deliver information to virtually any mobile phone equipped with a WiFi network interface and a camera. The iPoint does n...
Supercomputing Centers (SC’s) are unique resources that aim to enable scientific knowledge discovery through the use of large computational resources, the Big Iron. Design, acq...
E. Wes Bethel, John Van Rosendale, Dale Southard, ...
Video games are primarily designed for the players. However, video game spectating is also a popular activity, boosted by the rise of online video sites and major gaming tournamen...