Built upon a shared wireless medium, wireless mesh network is particularly vulnerable to jamming attacks. The ability to recover from attacks and maintain an acceptable level of s...
Public Web services are not designed to be used with specific other Web services in a composite Web service. This leads to the following requirements for the proper control of a ...
The term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a l...
—Audio-visual services are now commonly used on the Internet. Many are based on batch downloading of contents for later replay, but real-time interactive and streaming services a...