— Ad hoc network users are resource constrained: Before transmitting data, they have to take into account the energy expenditure involved. Even if a user is, in principle, willin...
— In order to support mobile users, the basic Internet protocols have been extended with protocols (e.g., Mobile IPv6) for intercepting and forwarding packets to a mobile and pos...
Johnny Lai, Y. Ahmet Sekercioglu, Norbert Jordan, ...
This paper presents a novel real-time, multi-modal biofeedback system for stoke patient therapy. The problem is important as traditional mechanisms of rehabilitation are monotonou...
Yinpeng Chen, Weiwei Xu, Richard Isaac Wallis, Har...
We report on a case study in which the Maude model checker has been used to analyze the Suzuki-Kasami distributed mutual exclusion algorithm with respect to the mutual exclusion p...
The authors have some experience in building virtual worlds for education purposes, in archaeology and for language learning. However, many mainstream world-building applications ...