— The optimal deployment of sinks in a sensor region for power efficient data gathering of a physical phenomenon is investigated in this work. In the system of consideration, no...
Lorenzo A. Rossi, Bhaskar Krishnamachari, C. C. Ja...
In recent years, Denial of Service attacks have evolved into a predominant network security threat. In our previous work, we identified the necessary building blocks for an effect...
This paper presents an architecture for service hosting on virtual clusters spanning multiple administrative domains that balances the requirements of application developers and r...
Bobby House, Paul Marshall, Michael Oberg, Henry M...
Synchronization in distributed systems is expensive because, in general, threads must stall to obtain a lock or to operate on volatile data. Transactional memory, on the other hand...
We present a supply-chain management system that supports transportation of cargo containers and monitors the quality of control during transport. Our system primarily focuses on ...
Klaas Thoelen, Sam Michiels, Wouter Joosen, Koen V...