— In this paper, we propose a theoretical framework for the analysis of the impact of ultra–wideband (UWB) interference on systems that use the popular combination of bit– in...
—The proliferation of wireless and mobile devices has fostered the demand for context-aware applications, in which location is one of the most significant contexts. Multilaterati...
Ubiquitous computing systems can be regarded as open systems where heterogeneous and previously unknown entities may spontaneously interact, due to intrinsic mobility of users and...
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Field workers of utility companies are regularly engaged in outdoor tasks such as network planning, maintenance and inspection of underground infrastructure. Redlining is the term...