Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this...
In this study, we analyzed the language use on Twitter personal exchanges as well as properties of the users’ networks, to study the influence of gender composition on expressio...
Funda Kivran-Swaine, Samuel Brody, Nicholas Diakop...
—In this paper, we propose the Staggered TDMA Underwater MAC Protocol (STUMP), a scheduled, collision free TDMA-based MAC protocol that leverages node position diversity and the ...
Kurtis B. Kredo II, Petar Djukic, Prasant Mohapatr...
—The changes in the communication paradigm envisioned for future networks, with peer-to-peer/symmetric attachments gaining momentum and two IP (Internet Protocol) versions coexis...
—3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service ...