We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharing content over a mobile network through opportunistic contacts has recently received considerable attention. In proposed scenarios, users store content they download in a lo...
Modern storage systems use thousands of inexpensive disks to meet the storage requirement of applications. To enhance the data availability, some form of redundancy is used. For e...
Liping Xiang, Yinlong Xu, John C. S. Lui, Qian Cha...
Industrial sensing, monitoring and automation offer a lucrative application domain for networking and communications. Wired sensor networks have traditionally been used for these ...
G. Bhatti, A. Mehta, Zafer Sahinoglu, J. Zhang, R....
The planning and management of supply chains require properly specifying the participating members and the relationships among them. Construction supply chains usually consist of n...
Jack C. P. Cheng, Kincho H. Law, Hans Bjornsson, A...