This paper presents an end-to-end reliable multicast protocol for use in environments with wireless access. It divides a multicast tree into sub-trees where subcasting within these...
Djamel Fawzi Hadj Sadok, Carlos de M. Cordeiro, Ju...
The growing diffusion of wireless-enabled portable devices and the recent advances in Mobile Ad-hoc NETworks (MANETs) open a new scenario where users can benefit from anywhere/any...
Dario Bottazzi, Antonio Corradi, Rebecca Montanari
Tool support for mobile application development can significantly improve programmer productivity and software quality. Pegboard is a novel tooling framework that extends the Ecli...
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Nowadays the photo-capturing devices are no longer limited to digital cameras but include mobile phones, PDAs and others. This is leading to a new problem: a very large number of ...
Yuri Almeida Lacerda, Hugo Feitosa de Figueir&ecir...