This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
We propose a peer-to-peer architecture designed to overcome asymmetries in upload/download speeds that are typical in end-user dialup, broadband and cellular wireless Internet con...
Sachin Agarwal, Moshe Laifenfeld, Ari Trachtenberg...
Abstract— A large portion of South Africa’s elephant population can be found on small wildlife reserves. When confined to enclosed reserves the elephant densities are much hig...
Parviz Palangpour, Ganesh K. Venayagamoorthy, Kevi...
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Abstract— Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources and one or more base stations, which are much more powerful l...
Andre Mota, Leonardo B. Oliveira, Felipe F. Rocha,...