—The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security con...
The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in applications such as disaster management, combat field reconnaissa...
We discuss the task of reconstructing the topological map of an environment based on the sequences of locations visited by a mobile agent ? this occurs in systems neuroscience, wh...
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Recent developments in mobile technologies and associated economies of scale via mature manufacturing processes have made possible the construction of pervasive systems in specifi...
George Roussos, Panos Kourouthanasis, Eugene A. Gr...