—Many sensing systems remotely monitor/measure an environment at several sites, and then report these observations to a central site. We propose and investigate several practical...
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
We present two projects that facilitate collective music creativity over networks. One system is a participative social music system on mobile devices. The other is a collaborativ...
Selectiveattentionis a mechanismsused to sequentiallyselectthe spatiallocationsof salientregionsin the sensor’sfieldof view. This mechanism overcomesthe problem of flooding limi...
Abstract. Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered u...