—In this paper we present APOS, a method for dynamically adapting the parameters of IEEE 802.11g to the estimated system state, with the aim of enhancing the quality of a voice c...
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
Abstract. Mobile devices are increasingly being equipped with wireless peerto-peer (P2P) networking interfaces, rendering the sharing of data among mobile devices feasible and bene...
Zhiyong Huang, Christian S. Jensen, Hua Lu, Beng C...
Many enterprises nowadays use business processes, based on the BPEL standard, to achieve their goals. These are complex, often distributed, processes. Monitoring the execution of ...
A seven degree-of-freedom (DOF) haptic device has been developed with applications towards robot-assisted minimally invasive surgery. The device consists of four degrees of force ...