—Programming Wireless Sensor Network (WSN) applications is known to be a difficult task. Part of the problem is that the resource limitations of typical WSN nodes force programm...
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Abstract— A crucial issue in deploying wireless sensor networks is to perform a sensing task in an area of interest in an energy-efficient manner since sensor nodes have limited...
Jaekyu Cho, Gilsoo Kim, Taekyoung Kwon, Yanghee Ch...
—Coupling Vehicular Ad Hoc Networks (VANETs) with wired networks such as the Internet via access points creates a difficult mix of highly mobile nodes and a static infrastructur...
Software applications that work with biomedical data have significant knowledge-management requirements. Formal knowledge models and knowledge-based methods can be very useful in m...
Martin J. O'Connor, Ravi Shankar, Samson W. Tu, Cs...