A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...
This paper presents a quantitative analysis of the reuse of learning objects in real world settings. The data for this analysis was obtained from three sources: Connexions' mo...
We propose the demonstration of SP4, a software-based programmable packet processing platform that supports (1) stateful packet processing useful for analyzing traffic flows wit...
Harjot Gill, Dong Lin, Lohit Sarna, Robert Mead, K...
—Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authen...
: We detail a code mapping scheme designed especially for devices in the enhanced wireless personal area networks operating in both the 868MHz and 915MHz bands for the emerging IEE...
Manjeet Singh, Zhongding Lei, Francois P. S. Chin,...