—Today’s mobile networks prevent users from freely accessing all available networks. Instead, seamless network composition could present a win-win situation for both users and ...
Pongsakorn Teeraparpwong, Per Johansson, Harsha V....
Abstract--A common concept to mitigate the effects of spectrum scarcity is to allow opportunistic dynamic spectrum access (DSA) to licensed frequency bands. In this context, the li...
Jad Nasreddine, Andreas Achtzehn, Janne Riihij&aum...
Multi-string matching is a key technique for implementing network security applications like Network Intrusion Detection Systems (NIDS) and anti-virus scanners. Existing DFA-based ...
Yi Tang, Junchen Jiang, Xiaofei Wang, Bin Liu, Yan...
This paper describes a prototype system, ZoneIT, for selectively controlling functionality of mobile devices, e.g. ringing of cellular telephones. ZoneIT exploits the fact that ma...
As the mobility of people increases, anytime, anywhere computing has become a must. The appearance of powerful portable computers, along with advancement in wireless communication...