Authenticating mobile computing users can require a significant amount of processing and communications resourcesā particularly when protocols based on public key encryption are...
The TCP/IP protocols and Sockets API underlie much of modern computation, but their semantics have historically been very complex and ill-defined. The real standard is the de fact...
Steve Bishop, Matthew Fairbairn, Michael Norrish, ...
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability concerns and central vulnerability points of current networks such as Tor. However, the P2P...
Ubiquitous physiological monitoring will be a key driving force in the upcoming wireless health revolution. Cardiac and brain signals in the form of ECG and EEG are two critical h...
Yu M. Chi, Patrick Ng, Eric Kang, Joseph Kang, Jen...
A new modeling framework is introduced for the analytical study of medium access control (MAC) protocols operating in multihop ad hoc networks. The model takes into account the eļ...
Marcelo M. Carvalho, Jose Joaquin Garcia-Luna-Acev...