Spam e-mails have become a serious technological and economic problem. So far we have been reasonably able to resist spam e-mails and use the Internet for regular communication by...
Mobile robot teams are particularly suited to applications where infrastructure is unavailable or damaged since they can be used to quickly form an infrastructure-less mobile ad h...
Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charl...
Due to the better utilization of computational and communication resources and the improved coordination of application subsystems, designers of large distributed embedded systems...
We propose a non-cumbersome automatic location estimation method based on an easily accessible infrastructure: the 802.11 LAN. The method consists of two phases: a map-preparation...
Increasingly pervasive computing throws up scenarios where users may wish to achieve some degree of security in their interaction with other people or equipment, in contexts where...
Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming...