The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
: Utility companies worldwide are facing a multitude of new challenges, which can not be met with the historically grown, monolithic IT systems currently in use. Service oriented a...
It is by now widely accepted that the arrival process of aggregate network traffic exhibits self-similar characteristics which result in the preservation of traffic burstiness (hig...
Dimitrios P. Pezaros, Manolis Sifalakis, David Hut...
Mobile phone users have to deal with limited battery lifetime through a reciprocal process we call human-battery interaction (HBI). We conducted three user studies in order to und...
The line-of-sight networks is a network model introduced recently by Frieze et al. (SODA’07). It considers scenarios of wireless networks in which the underlying environment has...