In this paper, we investigate the components of a Research 2.0 infrastructure. We propose building blocks and their concrete implementation to leverage Research 2.0 practice and te...
Thomas Daniel Ullmann, Fridolin Wild, Peter Scott,...
Simulation and emulation are valuable techniques for the evaluation of algorithms and protocols used in mobile ad-hoc networks. However, these techniques always require the simpli...
Abstract-- Rootkit attacks are a serious threat to computer systems. Packaged with other malware such as worms, viruses and spyware, rootkits pose a more potent threat than ever be...
We present a proposal for a next-generation Internet based on chargeable Web Services and Utility Computing realised by a series of open but interacting markets. We demonstrate thr...
In this work, we describe a simple 1-mask sacrificial layer process that allows us to prototype a tuneable capacitor. The process is specially optimized to procure a dual picks pr...