Technology presented in the paper [1] allows validation of software architecture before component upgrades. This paper presents a case study of applying this method to the upgrade ...
As users get connected with new-generation smart programmable phones and Personal Digital Assistants, they look for geographic information and location-aware services. In such a s...
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Sharing content over a mobile network through opportunistic contacts has recently received considerable attention. In proposed scenarios, users store content they download in a lo...
Despite the importance of real-world experiments, nearly all ongoing research activities addressing video streaming over MANETs are based on simulation studies. Earlier research s...
Stein Kristiansen, Morten Lindeberg, Daniel Rodr&i...