Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Routing in mobile ad hoc networks remains as a challenging problem given the limited wireless bandwidth, users’ mobility and potentially large scale. Recently, there has been a ...
Applications that rely on mobile devices for user interaction must be mindful of the user's limited attention, which will typically be split between several competing tasks. C...
Stephen Knox, Ross Shannon, Lorcan Coyle, Adrian K...
- Mobile agents have the ability to migrate through heterogeneous networks and execute at remote hosts. This ability can be exploited to improve the performance of agent based appl...
Abstract. In this paper, we describe an approach to activity recognition, which is based on a self-organizing, ad hoc network of body-worn sensors. It makes best use of the availab...