Suppose that some parties are connected by an incomplete network of reliable and private channels. The parties cooperate to execute some protocol. However, the parties are curious...
As a crucial issue in computer network security, anomaly detection is receiving more and more attention from both application and theoretical point of view. In this paper, a novel ...
With the advent of mobile computing and mobile services becoming more widespread and more complex, the development process of those services requires an ever more important focus o...
Continuous change of user requirements has become a constant for geo-information systems. Designing systems that can adapt to such changes requires an appropriate ethodology that ...
In this paper we describe our analysis of a real trace and propose a mobility model. The trace data we used for this study was collected from a military experiment carried out in L...
Xiaofeng Lu, Yung-chih Chen, Ian X. Y. Leung, Zhan...