A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
Recently, there arise a large number of graphs with massive sizes and complex structures in many new applications, such as biological networks, social networks, and the Web, deman...
–This paper presents a novel affect-sensitive human-robot interaction framework for rehabilitation of children with autism spectrum disorder (ASD). The overall aim is to enable t...
Changchun Liu, Karla Conn, Nilanjan Sarkar, Wendy ...
Services business generates significant amount of human and machine created data. Search and discovery of relevant information from this data is a critical factor in enhancing wor...
Nithya Rajamani, Murthy V. Devarakonda, Yu Deng, W...
We consider an ad-hoc wireless network operating within a free market economic model. Users send data over a choice of paths, and scheduling and routing decisions are updated dyna...