The application of a knowledge management strategy does not take place in a vacuum. Successfully meeting objectives of a knowledge management strategy may depend not only on the e...
Tony Jewels, Alan Underwood, Carmen de Pablos Here...
We propose an opportunistic channel access scheme for cognitive radio-enabled secondary networks. In our work, we model the channel occupancy due to Primary User (PU) activity as a...
Telepresent Agents are software Agents that are instantiated simultaneously within two or more distinct computer applications (called Locales) which are operating at distinct nodes...
This paper presents R-U-In? ? a social networking application that leverages Web 2.0 and IMS-based Converged Networks technologies to create a rich next-generation service. R-U-In...
—Upon the occurrence of a phenomenon of interest in a wireless sensor network, multiple sensors may be activated, leading to data implosion and redundancy. Data aggregation and/o...