With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
This paper analyzes voice transmission capacity on IEEE 802.11 ad hoc networks by performing simulations related to delay, jitter, loss rate, and consecutive losses. We evaluate th...
Pedro B. Velloso, Marcelo G. Rubinstein, Otto Carl...
With the increasing deployment of wireless overlay networks, a mobile node with a range of network interfaces can be connected to multiple heterogeneous or homogeneous access netw...
system during a single processor cycle. But we can abstract out properties of the sequences and focus on the properties of interest. The "specifications" given here are i...
We hypothesize that cultural narratives such as myths and folktales are more likely to achieve cultural stability if they correspond to a minimally counterintuitive (MCI) cognitiv...
Ara Norenzayan, Scott Atran, Jason Faulkner, Mark ...