Today’s Internet architecture makes no deliberate attempt to provide identity privacy—IP addresses are, for example, often static and the consistent use of a single IP address ...
Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren,...
— This paper outlines a novel and feasible procedure to predict vertical motions for safe landing of unmanned aerial vehicles (UAVs) during maritime operations. In the presence o...
Xilin Yang, Hemanshu Roy Pota, Matthew Garratt, Va...
—The design of a collision avoidance system for trains implies the design of a MAC layer for their specific requirements. It should be efficient, reliable, use broadcast and su...
Cristina Rico Garcia, Andreas Lehner, Thomas Stran...
Although still a relatively new undergraduate course of study at most colleges and universities, specialized degree programs in computer forensics and digital investigations are n...
Digital games are becoming a rising trend in eLearning due to their potential educational benefits. However, their application is hindered by issues such as their high production ...
Javier Torrente, Pablo Moreno-Ger, Baltasar Fern&a...