Recent advances in wireless technology and availability of portable devices with networking capabilities made the increasing hot topic, ubiquitous computing become reality. Also, ...
A rudimentary approach to mitigate interference issues in license-exempt 802.16 systems is presented. This approach operates by permitting each Base Station (BS), and associated Su...
Mobility, context-awareness and payment combined provide a customer with a completely new setting of consuming services at any time and any place. We introduce SmartRestaurant ser...
In this paper, we propose a new scalable application-layer protocol, specifically designed for data streaming applications with large client sets. This is based upon a control hie...
Panayotis E. Fouliras, Spiros Xanthos, Nikolaos Ts...
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...