This poster describes a robot cell-phone named CALLY with which we are exploring the roles of facial and gestural expressions of robotic products in the human computer interaction...
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
— Multi-radio multi-channel Wireless Mesh Networks (WMNs) are being increasingly deployed for broadband provision in enterprise, community, metropolitan and rural areas, due to t...
Indoor navigation highly depends on context and requires flexible data structures to support the many use cases and configurations. For example, an indoor navigation system must c...
The integration of different IP-based wireless networks, such as WiMAX and WiFi, becomes a 2-tier heterogeneous wireless networks is a more and more popular issue. In order to supp...
I-Shyan Hwang, Bor-Jiunn Hwang, K. Robert Lai, Lin...