Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effective...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
This paper describes an ongoing design experience conducted in the Neonatal Intensive Care Unit for Premature Newborns. The specificity and the delicateness of such a setting prov...
In the resource over-constrained environment of sensor networks, techniques for storing data locally in sensor nodes have been proposed to support efficient processing of adhoc qu...
Mohamed Aly, Nicholas Morsillo, Panos K. Chrysanth...
In this paper we present the Threshold Join Algorithm (TJA), which is an efficient TOP-k query processing algorithm for distributed sensor networks. The objective of a top-k query...
Recently, various robots capable of having a video chat with distant people have become commercially available. This paper shows that movement of these robots enhances distant peo...