Abstract--With the deployment of more and more resiliencecritical Internet applications, there is a rising demand for multihomed network sites. This leads to the desire for simulta...
Thomas Dreibholz, Martin Becke, Erwin P. Rathgeb, ...
This paper proposes a simple framework for building 'virtual networking agents'; programs that can communicate with users and collect information through the internet. T...
—This paper studies video multicasting in large scale areas using wireless mesh networks. The focus is on the use of Internet access gateways that allow a choice of alternative r...
Wanqing Tu, Cormac J. Sreenan, Chun Tung Chou, Arc...
Abstract. This paper details the results of a face verification competition [2] held in conjunction with the First International Conference on Biometric Authentication. The contes...
Kieron Messer, Josef Kittler, Mohammad Sadeghi, Mi...
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...