We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be succ...
Designing energy efficient protocols for ad hoc networks is important since there has been little improvement in the amount of energy stored on these devices. Previous work [1]
This paper presents and evaluates two principles for wireless routing protocols. The first is datapath validation: data traffic quickly discovers and fixes routing inconsistenc...
Abstract— Transporting video over wireless networks has twofold constraints. Not only should it satisfy delay requirements but power minimization and QoS issues should be handled...
Virtual reality is a useful tool to train individuals for various different situations or scenarios. A single person utilizing a virtual environment can greatly enhance their skil...
Fred Stakem, Ghassan Alregib, Biing-Hwang Juang, M...