A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Traditional web-based services that require users to browse via documents and fill out forms, are difficult to use with mobile devices. Moreover, as the web paradigm assumes activ...
Jussi Saarinen, Tommi Mikkonen, Sasu Tarkoma, Jani...
— For teams of cooperating autonomous lightweight robots with challenging dynamical locomotion properties a platform independent modular software architecture and platform indepe...
Martin Friedmann, Jutta Kiener, Sebastian Petters,...
In-network sensor query processing systems (ISQPs), or sensor databases, have been developed to acquire, process and aggregate data from wireless sensor networks (WSNs). Because W...
Increasing complexity of the functionalities and the resultant growth in number of gates integrated in a chip coupled with shrinking geometries and short cycle time requirements br...
Karanth Shankaranarayana, Soujanna Sarkar, R. Venk...