Ubicomp applications are characterized as situationaware, frequently-and-ephemerally-communicated and QoS-properties-associated. Using middleware to provide multiple QoS support f...
Stephen S. Yau, Yu Wang, Dazhi Huang, Hoh Peter In
Medical image reconstruction remains a topic of interest to medical researchers. Although the algorithms have become more mature, one particular challenge has persisted over the de...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...