Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it w...
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, Ja...
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
—The goal of this work is to determine the object correspondence between a sketched map and the scene depicted by the sketch, e.g., as represented by an occupancy grid map (OGM) ...
: Organic Computing is beginning to provide computer systems with organic and biological properties. We believe these systems will benefit from user interfaces that integrate the ...
From the 1990s on, one of the most important challenges facing computer science researchers has been the design and construction of software tools to exploit Internet computing. A...