Intrusion detection is an important problem in sensor networks. Prior works in static sensor environments show that constructing sensor barriers with random sensor deployment can ...
We consider the problem of providing network access to hosts whose physical location changes with time. Such hosts cannot depend on traditional forms of network connectivity and r...
John Ioannidis, Dan Duchamp, Gerald Q. Maguire Jr.
Recent growth in computing devices from the smartphone to the desktop computer has led to users interacting with multiple computing devices throughout the course of the day. Modern...
Daniel MacCormac, Mark Deegan, Fred Mtenzi, Brenda...
Conversation partners on mobile phones can align their walking gait without physical proximity or visual feedback. We investigate gait synchronization, measured by accelerometers ...
Roderick Murray-Smith, Andrew Ramsay, Simon Garrod...
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it...