Abstract With the rapid advances in mobile computing technology, there is an increasing demand for processing realtime transactions in a mobile environment. This paper studies con...
Kam-yiu Lam, Tei-Wei Kuo, Wai-Hung Tsang, Gary C. ...
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
Wearable medical systems, which are used for medical monitoring, assessment, and/or treatment have the essential requirements to be low energy consuming and reliable. They must be...
The energy consumed by data centers is starting to make up a significant fraction of the world’s energy consumption and carbon emissions. A large fraction of the consumed energ...
Nosayba El-Sayed, Ioan A. Stefanovici, George Amvr...