With the developments of related techniques in telecommunication and computer sciences, wireless sensor networks have been used more and more widely. While sensor nodes in wireles...
Min Meng, Hui Xu, Byeong-Soo Jeong, Sungyoung Lee,...
In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s password authentication scheme by using the Diffie-Hellman scheme. Later, Yoon, Ryu, and Yoo de...
Autonomic computing has attracted large amount of attention as a novel computing paradigm in the past few years. In this paper, we explore the inherent accordance between autonomi...
Jin Wang, Brian J. d'Auriol, Young-Koo Lee, Sungyo...
The 4th generation mobile communication system certainly will have a lot of improvement such as supporting higher multimedia loading, offering faster transmission rate, and the im...
Tin Yu Wu, Diego Chung, Chi-Yuan Chen, Han-Chieh C...
The aging of our society presents a range of challenges to housing providers. With the advanced mobile technologies we are now able to develop quality mobile services to help seni...