Abstract. Peer-to-Peer networks are comprised of multiple independently administered computers (peers) that cooperate via a common protocol in order to achieve a goal common to the...
The advent of social networking websites presents further opportunities for criminals to obtain information for use in identity theft, cyber-stalking, and worse activities. This p...
William Newk-Fon Hey Tow, Peter Dell, John Venable
Information grounds are places where people exchange information. Here we examine use of a mobile device-based social networking service as an information ground. The service allo...
Nonprofit organizations often need to excel in coordinating with other organizations and must do so in a variety of contexts and levels from the informal to the formal. Their abil...
Jennifer Stoll, W. Keith Edwards, Elizabeth D. Myn...
In this paper, we present a series of distributed algorithms for coverage verification in sensor networks with no location information. We demonstrate how, in the absence of locali...