Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Grid computing is becoming an important framework for enabling applications to utilize widely distributed collections of computational and data resources, however current grid sof...
Paul D. Coddington, Lici Lu, Darren Webb, Andrew L...
A useful function of augmented reality (AR) systems is their ability to visualize occluded infrastructure directly in a user’s view of the environment. This is especially import...
Mark A. Livingston, J. Edward Swan II, Joseph L. G...
Efficiently self organizing a network hierarchy with specific assignment of roles (or tasks) to sensors based on their physical wireless connectivity and sensing characteristics ...
Manish Kochhal, Loren Schwiebert, Sandeep K. S. Gu...
This paper presents an approach for classifying students in order to predict their final grade based on features extracted from logged data in an education web-based system. A comb...