A recent flooding algorithm [1] guaranteed correctness for networks with dynamic edges and fixed nodes. The algorithm provided a partial answer to the highly dynamic network (HDN)...
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
This paper outlines trends reshaping the business of International Long Distance (ILD) voice minutes trading. Our analysis is centered on Arbinet’s business model: an electro...
— Next-generation mobile communication systems will provide “always best connected” services to mobile users via cellular networks that provide wide area coverage for global ...
As society enters the twenty-first century there is a growing realization that information technology (IT) is heavily influencing organizational structures [1]. One such structure...