A mobile ad-hoc network creates a dynamic environment where node mobility can cause periodic changes in routes. Most existing fault localization algorithms assume availability of ...
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Current anonymous systems either use a small, fixed core set of mixes or randomly choose a sequence of peer nodes to form anonymous paths/tunnels. The resulting paths are fragile ...
This paper presents an analysis of how and why a new generation of virtual reality peripherals affect virtual reality in general, and its uses for education in particular. We descr...
Simulations utilizing virtual humans, or computer controlled agents, are more predominant now than ever. Many of these simulations suffer from a lack of effective, stimulating, and...