—The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security con...
Abstract—The IP Multimedia Subsystem (IMS) is being deployed in the Third Generation (3G) networks since it supports many kinds of multimedia services. However, the security of I...
Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong ...
Abstract—This paper presents a new desynchronization algorithm aimed at providing collision-free transmission scheduling for single-hop and acyclic multi-hop wireless sensor netw...
Current methods of estimating air quality involve assigning a single value called the Air Quality Index (AQI) to a large land area for a 24-hour period based on a very few, sparse...
How to achieve knowledge creation effectively remains a problem, this becomes even more difficult in a loosely knitted community such as networks of practice. This is because know...