Personal Health (pHealth) sensor networks are generally used to monitor the wellbeing of both athletes and the general public to inform health specialists of future and often seri...
Trust is a critical issue in e-commerce and e-service environments. Some applications (such as eBay) have introduced various trust management mechanisms to provide valuable inform...
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
In recent years, the use of Intelligent Closed-Circuit Television (ICCTV) for crime prevention and detection has attracted significant attention. Existing face recognition system...
Ting Shan, Shaokang Chen, Conrad Sanderson, Brian ...
—In the majority of today’s IT organizations, Service Level Agreements (SLAs) are an important means for underpinning IT service provisioning by clearly defined Quality of Ser...