Large sensor networks in applications such as surveillance and virtual classrooms, have to deal with the explosion of sensor information. Coherent presentation of data coming from...
Shichao Ou, Deepak R. Karuppiah, Andrew H. Fagg, E...
In this paper, we present a system architecture that allows users to interact with embedded systems located in their proximity using Smart Phones. We have identified four models o...
P2P storage systems must protect data against temporary unavailability and the effects of churn in order to become platforms for safe storage. This paper evaluates and compares re...
Chris Williams, Philippe Huibonhoa, JoAnne Hollida...
— Log-linear models are widely used for labeling feature vectors and graphical models, typically to estimate robust conditional distributions in presence of a large number of pot...
Various schemes have been proposed to achieve strong authenticationof streamed data in a lossy network by means of “light” digital signatures. Such techniques perform a strong...