Fault-tolerant mobile computing systems have different requirements and restrictions, not taken into account by conventional distributed systems. This paper presents a coordinate...
In distributed computing systems, processes in different hosts take checkpoints to survive failures. For mobile computing systems, due to certain new characteristics conventional d...
—Passive RFID tags transmit their ID information to a tag reader upon energization by the reader. These transmitted signals, or IDs, may collide if multiple tags transmit their I...
Abstract—Advanced network and media applications such as multimedia streaming and Internet telephony are becoming an integral part of the Internet. Reservation protocols, such as...
Hromuzd Khosravi, Daniel Reininger, Maximilian Ott...
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...