Abstract—In this paper, we consider privacy challenges in eventdriven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to det...
—Web caching and replication techniques increase accessibility of Web contents and reduce Internet bandwidth requirements. In this paper, we are considering the replica placement...
We present 1 − approximation algorithms for the maximum matching problem in location aware unit disc graphs and in growth-bounded graphs. The algorithm for unit disk graph is loc...
— With the advent of cognitive radio technology, new paradigms for spectrum access can achieve near-optimal spectrum utilization by letting users sense and utilize available spec...
— Bandwidth constraint models have been a topic of intense discussions at the IETF meetings. Three conventional methods have been described in informational IETF RFCs and their p...
Joshua B. Goldberg, Sukrit Dasgupta, Jaudelice Cav...