As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Recently, several MAC protocols using directional antennas have been proposed for ad hoc networks, which are mainly evaluated by computer simulations. This paper develops a MAC pr...
Abstract—Smart Home, this term comprises various approaches, engaged in living and working now and in the future. The objectives of the various approaches range from enhancing co...
Sebastian Dengler, Abdalkarim Awad, Falko Dressler
— We present an augmented map interface called Phygital (physical, digital) Map that enables users to access digital multimedia stored in various off-the-shelf devices from physi...
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...