—We apply social network analysis (SNA) to examine the dynamics of leadership in distributed groups, specifically Free/Libre Open Source Software development projects, and its r...
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
The movement in public transport networks is organized according to schedules. The real-world schedules are specified by a set of periodic rules and a number of irregularities fr...
—At present wireless devices are able to select their working frequency only to a limited extend although several measurements have shown that the current spectrum regulations ar...
Matthias Wellens, Alexandre de Baynast, Petri M&au...
— The standard IEEE 802.15.4 medium access control (MAC) protocol is designed for low-power transmissions in low-rate and short-distance wireless personal area networks (WPANs). ...