—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
—In this paper we provide an overview of CPM, a cross-layer framework for Constrained Power Management, and we present its application on a real use case. This framework involves...
Patrick Bellasi, Stefano Bosisio, Matteo Carnevali...
Ambient intelligent applications require applications to recognise user activity calmly in the background, typically by instrumentation of environments. In contrast, we propose the...
Martin Strohbach, Gerd Kortuem, Hans-Werner Geller...
This paper provides insight into the ramifications of battery exhaustion Denial of Service (DoS) attacks on battery-powered mobile devices. Several IEEE 802.11 Wi-Fi, IEEE 802.15....
Benjamin R. Moyers, John Paul Dunning, Randolph Ma...
Digital video stabilization enables to acquire video sequences without disturbing jerkiness by compensating unwanted camera movements. In this paper we propose a novel fast image r...
Sebastiano Battiato, Arcangelo Bruna, Giovanni Pug...