Whether they are modeling bookmarking behavior in Flickr or cascades of failure in large networks, models of diffusion often start with the assumption that a few nodes start long ...
Eric Sun, Itamar Rosenn, Cameron Marlow, Thomas M....
With a large variety of wireless access technologies available, multi-homed devices may strongly improve the performance and reliability of communication when using multiple networ...
Geert Jan Hoekstra, Robert D. van der Mei, J. W. B...
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
This paper describes the experimental implementation of an online algorithm for cooperative localization of submerged autonomous underwater vehicles (AUVs) supported by an autonom...
Maurice F. Fallon, Georgios Papadopoulos, John J. ...
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...