The performance of peer-to-peer systems depends on the level of cooperation of the system's participants. While most existing peer-to-peer architectures have assumed that user...
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
With the rapid growth of the Internet into a global communication and commercial infrastructure, the need for Quality of Services (QoS) in the Internet becomes more and more import...
Haci A. Mantar, Ibrahim T. Okumus, Junseok Hwang, ...
The aim of the presented system is simplification and speedup of the daily pathological examination routine. The system combines telepathology with computer-aided diagnostics algor...
Grigory Begelman, Michael Pechuk, Ehud Rivlin, Edm...
In this paper we address the problem of robustly estimating the position of randomly deployed nodes of a Wireless Sensor Network (WSN), in the presence of security threats. We prop...