A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
This paper shows that in education and training systems LOM can be used to map the structure of courses. The necessary extension of the aggregation level is introduced. The descrip...
Stefan Hoermann, Cornelia Seeberg, Luka Divac-Krni...
—Creating latency insensitive or asynchronous designs from clocked designs has potential benefits of increased modularity and robustness to variations. Several transformations h...
Bluetooth technology offers the potential for low-cost, broadband wireless access for a range of mobile and portable devices. It can thus provide for ubiquitous computing across a...
We present DIVERSE, a highly modular collection of complimentary software packages designed to facilitate the creation of device independent virtual environments. DIVERSE is free/...
John T. Kelso, Lance E. Arsenault, Steven G. Satte...