Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
1 In this paper we address the problem of selecting probe station locations from where probes can be sent to monitor all the nodes in the network. Probe station placement involves...
— Probe stations are specially instrumented nodes from where probes can be sent to monitor the network. Probe station locations affect probing efficiency, monitoring capability,...
Using a learning management system (LMS) is a common practise nowadays. Such instruments are used in educational institutions to enhance and support the teaching act as well as in ...
This paper describes an installation created by LEMUR (League of Electronic Musical Urban Robots) in January, 2005. The installation included over 30 robotic musical instruments a...