— The Internet provides no information on the fate of transmitted packets, and end systems cannot determine who is responsible for dropping or delaying their traffic. As a resul...
Katerina J. Argyraki, Petros Maniatis, O. Irzak, S...
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Abstract— We developed the HAT (Home Appliance Translator) and HAT-Sub to enable conventional appliances without telecommunication capabilities to connect to home networks. The d...
Collection management policies of libraries were mainly shaped by in-house use of materials in the past. Yet the emergence of electronic journals and their availability through pu...
Wireless sensor networks (WSNs) are typically characterized by a limited energy supply at sensor nodes. Hence, energy efficiency is an important issue in the system design and op...