The widespread diffusion of portable devices with multiple wireless interfaces, e.g., UMTS/GPRS, IEEE 802.11, and/or Bluetooth, is enabling multi-homing and multi-channel scenarios...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
Abstract. Behavioral reflection is crucial to support for example functional upgrades, on-the-fly debugging, or monitoring critical applications. However the use of reflective f...
—In this paper, we study a new family of carrier-hopping prime codes (CHPCs), so-called quadraticcongruence CHPC (QC-CHPC), with expanded code cardinality by relaxing the maximum...
Wing C. Kwong, Cheng-Yuan Chang, Hung-Ta Chen, Guu...
Business process analysis ranges from model verification at design-time to the monitoring of processes at run-time. Much progress has been achieved in process verification. Today...
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...