Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
As Web Services have matured they have been substantially leveraged within the academic, research and business communities. An exemplar of this is the realignment, last year, of t...
E-Laboratories are important components of elearning environments, especially in scientific and technical disciplines. First widespread E-Labs consisted in proposing simulations o...
The explosive growth of location-detection devices (e.g., GPS-like devices and handheld devices) along with wireless communications and mobile databases results in realizing locati...
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...