Abstract— Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition t...
We present our work on composing mobile Web services, denoted by M-services, in the wireless world. The wireless world has its own features that make it completely different from t...
— In this paper we study a variation of the Dynamic Traveling Repairperson Problem (DTRP) in which there are two classes of demands; high priority, and low priority. In the probl...
Stephen L. Smith, Marco Pavone, Francesco Bullo, E...
Algorithms are proposed to automatically locate the foot anatomical points from scanned 3D point data based on a novel method that uses the pternion point for foot alignment, wher...
In this paper we present a gossip based protocol for path discovery in Mobile Ad Hoc Networks (MANETs). While in the classical gossip algorithm each node forwards a packet with th...