The concept of semantic and context aware intelligent systems provides a vision for the Information Society where the emphasis lays on computing applications that can sense context...
Minas Pertselakis, Dimitrios S. Frossyniotis, Andr...
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Abstract-The current trend in constructing high-performance computing systems is to connect a large number of machines via a fast interconnect or a large-scale network such as the ...
This paper addresses the issue of network life during repeated broadcasts originating from the same source in large, strip-shaped wireless sensor networks. The proposed technique w...
We present A-MAC, a receiver-initiated link layer for low-power wireless networks that supports several services under a unified architecture, and does so more efficiently and sca...
Prabal Dutta, Stephen Dawson-Haggerty, Yin Chen, C...