The rising costs of energy and world-wide desire to reduce CO2 emissions has led to an increased concern over the energy efficiency of information and communication technology. Wh...
Andreas Berl, Nicholas J. P. Race, Johnathan Ishma...
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
In this paper, we present a network service specifically designed for multimedia servers. It uses a histogram based traffic characterization and an overload control protocol to el...
Monitoring frequently occuring items is a recurring task in a variety of applications. Although a number of solutions have been proposed there has been few to address the problem i...
Background: Microorganisms display vast diversity, and each one has its own set of genes, cell components and metabolic reactions. To assess their huge unexploited metabolic poten...