—We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate node...
The possibility of speech processing in the absence of an intelligible acoustic signal has given rise to the idea of a `silent speech' interface, to be used as an aid for the...
Bruce Denby, Thomas Schultz, Kiyoshi Honda, Thomas...
Internet routing is mostly based on static information-it's dynamicity is limited to reacting to changes in topology. Adaptive performance-based routing decisions would not o...
Ioannis C. Avramopoulos, Jennifer Rexford, Robert ...
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
In this paper we present a video communication system that integrates end-to-end buffer management and congestion control at the source with the playout adjustment mechanism at th...
Ivan V. Bajic, Omesh Tickoo, Anand Balan, Shivkuma...