In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
Video-on-demand over IP (VOD) is one of the best-known examples of “next-generation” Internet applications cited as a goal by networking and multimedia researchers. Without em...
Hongliang Yu, Dongdong Zheng, Ben Y. Zhao, Weimin ...
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
: The task of the creatures in the "creatures' exploration problem" is to visit all empty cells in an environment with a minimum number of steps. We have analyzed th...
This paper explores the recovery and rate capacity effect for batteries used in embedded systems. It describes the prominent battery models with their advantages and drawbacks. It...
Venkat Rao, Gaurav Singhal, Anshul Kumar, Nicolas ...