Socio-technical developments in computing have resulted in the emergence of innovative mobile systems which exploit the information available on the Internet to optimize the perfo...
Pravin Pawar, Bert-Jan van Beijnum, Hermie Hermens...
—Embedding small devices into everyday objects like toasters and coffee mugs creates a wireless network of objects. These embedded devices can contain a description of the underl...
Designing for a supple interaction, involving users bodily and emotionally into a ‘dance’ with a system is a challenging task. Any break-ups in interaction become fatal to the...
Existing solutions to carrier-based sensor placement by a single robot, in a bounded unknown region of interest (ROI), do not guarantee full area coverage and/or do not terminate. ...
Greg Fletcher, Xu Li, Amiya Nayak, Ivan Stojmenovi...
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...