Application-level overlays have emerged as a useful means of offering network services that are not supported by the underlying physical network. Most overlays employ proprietary d...
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Applications are the ultimate consumers of the information collected by sensors. There exist several frameworks for the interactions between end-user applications and sensors. They...
Truong Ta, Nuru Yakub Othman, Roch H. Glitho, Ferh...
Information systems (IS) research on user involvement has primarily theorized relationships between developers, managers and users in systems development. However, so far, marginal...