This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Wireless sensor networks have been traditionally designed to be privately owned and used. Hence the two hallmark features of sensor networks, namely customized network application...
Amiya Bhattacharya, Meddage S. Fernando, Partha Da...
Since the human face plays an important role in man-to-man communication, systems enabling distant users to communicate while viewing each others' face have been demanded. Re...
The university campus is an interesting application environment for the ubiquitous computing paradigm: a large number of users share a substantial amount of their information need...
Analysis of existing ICT-based solutions for the education of long-term ill children reveal several weaknesses with respect to social and cooperative involvement, cost of developme...
Pieter Jorissen, Fabian Di Fiore, Gert Vansichem, ...