: IT-security has become a vital factor in electronic commerce nowadays. Thus, investments have to be made in order to safeguard security. However, the benefits of these investment...
Jan vom Brocke, Gereon Strauch, Christian Buddendi...
We analyze a previously unexplored generalization of the scalar total variation to vector-valued functions, which is motivated by geometric measure theory. A complete mathematical...
In this paper we investigate the performance of IEEE 802.11 ad hoc networks by means of an experimental study. Measurements on IEEE 802.11 ad hoc networks confirm previous sim...
Giuseppe Anastasi, Eleonora Borgia, Marco Conti, E...
The computing community has long faced the problem of scientifically comparing different computers and different algorithms. When architecture, method, precision, or storage capac...
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...