User’s privacy concerns represent one of the most serious obstacles to the wide adoption of mobile social software applications. In this paper, we introduce a conceptual model wh...
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
— This paper presents the ALCA (Asymmetric Link Collision Avoidance) protocol. ALCA was designed to deal with a known deficiency of the Basic Scheme [1] for power control in 802...
Internet technology is promised to provide the broadband multi-service future. Today this technology can not provide basic quality guarantees for the services rendered. Generally ...
Paul Sijben, Willem van Willigenburg, Michel de Bo...
We propose a game-theory-based cross-layer optimization scheme for wireless Direct Sequence Code Division Multiple Access (DSCDMA) visual sensor networks. The scheme uses the Nash...