—We present a multi-constrained routing algorithm, called Delay-constrained Pool Sharing (DPS), in a survivable mesh network. The goal of this algorithm is to find a pair of link...
Peer-to-peer networks and grids offer promising paradigms for developing efficient distributed systems and applications. Event-based middleware is becoming a core architectural el...
The diffusion of innovations has long been a research domain in IS research. Yet, there is no sound theory nor practice to fully understand the complex mechanisms behind networks ...
An event correlation is becoming an important service in event-based middleware allowing subscribers in publish/subscribe paradigm to consume patterns of events (composite events)...
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...