A large number of papers have proposed cryptographic protocols for establishing secure group communication. These protocols allow group members to exchange or establish keys to en...
Ahren Studer, Christina Johns, Jaanus Kase, Kyle O...
A new and simple network simulator Nessi is described in this paper. While other simulators focus on minimizing the simulation time, Nessi tries to minimize the development time an...
Service composition is one of the key objectives for adopting Service Oriented Architecture. Today, web services, however, are not always perfectly compatible and composition mism...
Xitong Li, Yushun Fan, Jian Wang, Li Wang, Feng Ji...
Over the past few years, researchers have developed many crosslayer wireless protocols to improve the performance of wireless networks. Experimental evaluations of these protocols...
Man Cheuk Ng, Kermin Elliott Fleming, Mythili Vutu...
Background: Image analysis is an essential component in many biological experiments that study gene expression, cell cycle progression, and protein localization. A protocol for tr...
Zafer Aydin, John I. Murray, Robert H. Waterston, ...