Despite their widespread deployment, many aspects of wireless network performance are poorly understood, and there is great room from improvement in wireless network reliability a...
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
Currently available Set-Top-Boxes (STBs) are mainly used for digital TV reception. The User Interface (UI) and the UI dialog of such a device usually focus on its technological as...
This paper considers the support of real-time applications in an Integrated Services Packet Network (ISPN). We rst review the characteristics of real-time applications. We observ...
An architecture is described for designing systems that acquire and manipulate large amounts of unsystematized, or so-called commonsense, knowledge. Its aim is to exploit to the fu...