The use of mobile devices is limited by the battery lifetime. Some devices have the option to connect an extra battery, or to use smart battery-packs with multiple cells to extend...
Marijn R. Jongerden, Boudewijn R. Haverkort, Henri...
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
Femtocell is an emerging technology for expanding cell coverage and increasing data rate, and its users deploy in their own premises by themselves. Therefore, femto base stations c...
Sam Yeoul Choi, Tae-Jin Lee, Min Young Chung, Hyun...
We suggest harvesting the power of multiplayer design to bridge content across different media platforms and develop player-driven cross-media experiences. This paper first argues ...
The established host-centric networking paradigm is challenged due to handicaps related with disconnected operation, mobility, and broken locator/identifier semantics. This paper...