The Health Insurance Portability and Accountability Act of 1996 (HIPAA) has resulted in the presence of very descriptive privacy policies on healthcare websites. These policies ar...
Julia Brande Earp, Matthew W. Vail, Annie I. Ant&o...
— In this paper, we develop contention-based medium access control (MAC) schemes for both best-effort data transmissions and delay-sensitive multimedia transmissions over WLANs. ...
Fanglei Sun, Victor O. K. Li, Zhifeng Diao, Zhengy...
Abstract—In this paper we address the problem of energyefficient event detection in wireless sensor networks (WSNs). Duty cycling is a fundamental approach to conserving energy i...
Discovering web navigational trends and understanding data mining results is undeniably advantageous to web designers and web-based application builders. It is also desirable to i...
Jiyang Chen, Tong Zheng, William Thorne, Osmar R. ...
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...