In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
UMTS networks will be based on the Internet Protocol (IP) to provide an efficient support for applications with bursty traffic characteristics, e.g., WWW browsers. Such IP-based n...
In this paper, we present two novel disk failure recovery methods that utilize the inherent characteristics of video streams for efficient recovery. Whereas the first method explo...
We present a virtual environment application that allows users to access embedded information within an immersive virtual space. Due to the richness and complexity of this environ...
In Cooperative Automatic Repeat reQuest (C-ARQ) protocols, one or more nodes can act as relays, collaborating in the frame retransmission process between a sender and a destination...