This paper summarizes two studies and the contemporary literature on the design and construction of effective and efficient Computer Based Learning (CBL) environments. There is ade...
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
Development of portable network-aware applications demands an interface to the network that allows an application to obtain information about its execution environment. This paper...
Bruce Lowekamp, Nancy Miller, Dean Sutherland, Tho...
In a public cloud, bandwidth is traditionally priced in a pay-asyou-go model. Reflecting the recent trend of augmenting cloud computing with bandwidth guarantees, we consider a n...
The field of human-computer interaction has been widely investigated in the last years, resulting in a variety of systems used in different application fields like virtual reality...
Edoardo Ardizzone, Antonio Chella, Roberto Pirrone