—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
In relation to its growth in size and user population, the Internet faces new challenges that have triggered the proposals of value-added network services, e.g., IP multicast, IP ...
This paper presents u-Photo which is an interactive digital still image including information of pervasive services associated with networked appliances and sensors in pervasive co...
This paper describes a monitoring tool for grid computing[5], called visPerf. It is difficult to see the status of a working production grid system without a customized monitorin...
DongWoo Lee, Jack Dongarra, Rudrapatna S. Ramakris...
Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). In these so called vehicular ad hoc networks (VANETs) security and priv...