Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
In an online experiment, I apply theory from psychology and communications to find out whether group information management tasks are governed by the same communication processes...
We introduce an efficient method for synthesizing acceleration noise – sound produced when an object experiences abrupt rigidbody acceleration due to collisions or other contac...
—We consider a general wireless channel model for different types of code-division multiple access (CDMA) and space-division multiple-access (SDMA) systems with isometric random ...
Sensor networks are deployed to monitor the surroundings and keep the end-user informed about the events witnessed. Different types of events have different levels of importance f...