Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while boundin...
Organizations increasingly coordinate their product and service development processes to deliver their products and services as fast as possible, and to involve employees, custome...
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
tract: Real-time Burst Event Detection in Water Distribution Systems Seshan Srirangarajan 1 , Mudasser Iqbal 1 , Michael Allen 2 , Ami Preis 2 , Cheng Fu 1 , Lewis Girod 3 , Kai-Ju...
Seshan Srirangarajan, Mudasser Iqbal, Michael Alle...
Advanced Traveler Information Systems (ATIS) require e cient information retrieval and updating in a dynamic environment at di erent geographical scales. ATIS applications are use...