This paper proposes a chaotic fingerprint images encryption approach. An image of a fingerprint is encrypted via a twodimensional (2D) chaotic sequence obtained from multi-scrol...
The adoption of the IPv4 protocol in wireless technologies has considerably increased the number of hosts that can potentially access the global Internet. The pressure for more IP...
By federating resources from multiple domains, a shared infrastructure provides aggregated computation resources to a large number of users. With rapid advances in virtualization ...
Dongyan Xu, Paul Ruth, Junghwan Rhee, Rick Kennell...
A routing protocol is designed considering a particular environment all the time which is not possible in the case of practical ad hoc networks. Because of the uncertainty in topol...
We introduce a novel approach to the creation of Virtual Reality Art installations, which supports the design of alternative worlds, in which laws of Physics can be redefined to i...
Marc Cavazza, Jean-Luc Lugrin, Simon Hartley, Paol...