This demonstration reports results from the EU-funded project Ambient Agoras, investigating future applications of ubiquitous and ambient computing in workspaces. Instead of prese...
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
Abstract. The promise of the grid is that it will enable public access and sharing of immense amounts of computational and data resources among dynamic coalitions of individuals an...
Chris Mattmann, Sam Malek, Nels Beckman, Marija Mi...
Pervasive devices are becoming popular and smaller. Those mobile systems should be able to adapt to changing requirements and execution environments. But it requires the ability t...
Daniel Cheung-Foo-Wo, Jean-Yves Tigli, Stephane La...
Reverse link (or uplink) performance of cellular systems is becoming increasingly important with the emergence of new uplink-bandwidth intensive applications such as Video Share [...
Balaji Rengarajan, Alexander L. Stolyar, Harish Vi...