Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Mobility management is vital for realizing large-scale wireless mesh networks to provide cost-effective broadband Internet access. Although a considerable amount of research on mo...
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Current ubiquitous computing environments provide many kinds of information. This information may be accessed by different users under varying conditions depending on various conte...
Abstract. Autonomous learning systems of significant complexity often consist of several interacting modules or agents. These modules collaborate to produce a system which, when vi...