In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
This article describes the status and analyses the challenges of mobile application development, proposed a frame of component-based hierarchical development. Software is divided ...
Multicast network services advantageously complement multimedia information and communication technologies, as they open up the realm for highly scalable multicustomer application...
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Technology is now available for creating affordable sensor networks and infrastructures for ubiquitous computing environments. In the area of ambient assisted living, contextaware...