This paper proposes initial steps towards a conceptual framework for context-aware systems. It is an attempt towards a general context model to aid thinking and describing context...
In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against a...
The trend towards value-added Internet services causes network providers to deploy new network based quality-of-service and security services. Today, however, the customer has onl...
In this paper, we consider the transport capacity of ad hoc networks with a random flat topology under the present support of an infinite capacity infrastructure network. Such a...
Ensuring that every sensor node has the same code version is challenging in dynamic, unreliable multi-hop sensor networks. When nodes have different code versions, the network may...