Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Functional magnetic resonance imaging (fMRI) has become increasingly used for studying functional integration of the brain. However, the large inter-subject variability in function...
In this paper, we develop adaptive metrics to identify stable links in a mobile wireless networking environment based on the analysis of link durations in several different mobili...
Michael Gerharz, Christian de Waal, Matthias Frank...
In this paper we present an online algorithm that attacks the problem of placing relay nodes in regions where high localized congestion is detected. Congestion refers to the netwo...