Abstract--With the availability of powerful computational and communication systems, scientists now readily access large, complicated derived datasets and build on those results to...
Leon J. Osterweil, Lori A. Clarke, Aaron M. Elliso...
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
Abstract-- In a relay network with a single sourcedestination pair, we examine the achievable rates with amplifyand-forward (AF) relaying strategy. Motivated by applications in sen...
Abstract--Early P2P-TV systems have already attracted millions of users, and many new commercial solutions are entering this market. Little information is however available about h...