With the advent of the new generation of Internet-based technology, in particular Web Services, the automation of business activities that are distributed across multiple enterpri...
Wenbing Zhao, Louise E. Moser, P. M. Melliar-Smith
This is the second part of a tutorial discussing the experimental protocol issues in Testing the Torah Code Hypothesis. The principal concept is the test statistic which is used t...
We present Typhoon, a protocol designed to reliably deliver large objects to all the nodes of a wireless sensor network (WSN). Typhoon uses a combination of spatially-tuned timers,...
Chieh-Jan Mike Liang, Razvan Musaloiu-Elefteri, An...
— In this paper we propose Cognitive Medium Access (CMA), a protocol aimed at improving coexistence with a set of independently evolving WLAN bands. A time-slotted physical layer...
This paper proposes an innovative use of a mix of networking standards and software implementation technologies for the design of industrial Human Machine Interface (HMI) systems....
Alessandro Bozzon, Marco Brambilla, Piero Fraterna...