— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Abstract— Self-assembly is a process through which an organized structure can spontaneously form from simple parts. Taking inspiration from biological examples of self-assembly, ...
This paper proposes an optimization technique for spotchecking to minimize the computation time of volunteer computing (VC) systems with malicious participants who return erroneou...
Gesture interfaces are needed for natural intuitive communication with machine devices. Hand gesture intuitiveness is the cognitive association between a command or intent, and it...
— Wireless reprogramming of the sensor network is useful for uploading new code or for changing the functionality of the existing code. In recent years, the research focus has sh...
Rajesh Krishna Panta, Saurabh Bagchi, Issa Khalil,...