Communication in 3G networks may experience packet losses due to transmission errors on the wireless link(s) which may severely impact the quality of conversational and streaming ...
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
— The chaos game, in which a moving point is repeatedly averaged toward randomly selected vertices of a triangle, is one method of generating the fractal called the Sierpinski tr...
– This paper describes a wireless sensor network for mine safety monitoring. Based on the characteristics of underground mine gallery and the requirements for mine safety monitor...
Xiaoguang Niu, Xi Huang, Ze Zhao, Yuhe Zhang, Chan...