Traffic regulation in public and private wireless LANs face a number of significant challenges, particularly in commercial networks where there is a need for efficient regulati...
Raymond R.-F. Liao, Rita H. Wouhaybi, Andrew T. Ca...
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Novel ubiquitous computing applications such as intelligent vehicles, smart buildings, and traffic management require special properties that traditional computing applications d...
We address the problem of detecting and tracking people with a mobile robot. The need for following a person with a mobile robot arises in many different service robotic applicati...
The future-generation wireless systems will combine heterogeneous wireless access technologies to provide mobile users with seamless access to a diverse set of applications and ser...