The wireless networks are notoriously error prone and all errors cannot be prevented in real-time communications. The problem of error correction becomes even more challenging in ...
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
As mobile computing becomes common, the battery issue of mobile computing devices has become increasingly notable. To this end, research and development of various power-conservat...
—In this paper we present a new cross-platform approach for video game delivery in wired and wireless local networks. The developed 3D streaming and video streaming approaches en...
Audrius Jurgelionis, Francesco Bellotti, Alessandr...
Abstract. In this paper we present a layered architecture for modeling workflows in Mobile Ad-Hoc NETworks (manets) using algebraic higher order nets (aho nets). manets are networ...
Julia Padberg, Kathrin Hoffmann, Hartmut Ehrig, To...