Pervasive computing environments will combine everyday physical spaces with network aware devices and services; hence providing computing behaviour that is much more entwined with...
In this paper we investigate the survivability of multilevel ad-hoc groups for critical operations through a case study. We aim to provide a formal trust framework for establishin...
Commercial airlines often encounter imbalances in their inventory of unit loading devices (ULDs). A stochastic simulation model was developed to evaluate inventory policies. The s...
Chatabush Roongrat, Jay M. Rosenberger, Brian Huff
There is growing evidence suggesting that synchronization changes in the oscillatory neuronal dynamics in the EEG or MEG reflect the transient coupling and uncoupling of functiona...
Marcel C. M. Bastiaansen, Lilla Magyari, Peter Hag...
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...