The terms pervasive and ubiquitous computing are used to describe a smart space populated by hundreds of intelligent devices that are embedded in their surroundings. Characteristi...
We propose a novel solution for securing wireless ad-hoc networks. Our goal is to provide secure key exchange in the presence of device failures and denial-of-service attacks. The ...
Arno Wacker, Timo Heiber, Holger Cermann, Pedro Jo...
Providing sustainable energy is one of the fundamental challenges for mankind. With energy usage being a part of everyday activities and with the increasingly diversity of energy ...
Albrecht Schmidt, Adrian Friday, Hans-Werner Gelle...
Object recognition accuracy can be improved when information from multiple views is integrated, but information in each view can often be highly redundant. We consider the problem...
Chris Mario Christoudias, Raquel Urtasun, Trevor D...
We consider the throughput/delay tradeoffs for scheduling data transmissions in a mobile ad hoc network. To reduce delays in the network, each user sends redundant packets along mu...