: Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presence of untrusted intermediary application proxies used by clients to communicate...
Yong Song, Victor C. M. Leung, Konstantin Beznosov
Cyclic definitions in description logics have until now been investigated only for description logics allowing for value restrictions. Even for the most basic language which allow...
Abstract— In this paper, we present a range-free ad-hoc localization algorithm called UPL (Urban Pedestrians Localization), for positioning mobile nodes in urban district. The de...
A MAC protocol is proposed for proactive discovery in which wireless devices periodically broadcast packets containing presence or service information. The protocol is based on Fra...
A method is presented that allows one to exactly determine all the characteristics of a PSO’s sampling distribution and explain how it changes over time, in the presence stochas...