We propose a novel solution for securing wireless ad-hoc networks. Our goal is to provide secure key exchange in the presence of device failures and denial-of-service attacks. The ...
Arno Wacker, Timo Heiber, Holger Cermann, Pedro Jo...
This paper presents a three steps methodology for predicting the failure shear effort in concrete beams. In the first step, dimensional analysis is applied to obtain several sets o...
Amparo Alonso-Betanzos, Enrique Castillo, Oscar Fo...
This paper describes a system that is robust with respect to sensor failure. The system utilizes multiple sensor inputs (three in this case) connected to a programmable device (FP...
The Internet is crucial to business, government, education and many other facets of society and its continuing scalability places serious challenges on the routing system's c...
The rapid growth of the Web has made it possible to build collaborative applications on an unprecedented scale. However, the request-reply interaction model of HTTP limits the rang...