— Local maps algorithms have demonstrated to be well suited for mapping large environments as can reduce the computational cost and improve the consistency of the final estimati...
— With an enhanced client computer performance and network bandwidth, peer-to-peer (P2P) content distribution networks are receiving much attention. However, along with the popul...
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...
—We present a cooperative spatial reuse (CSR) scheme as a cooperative extension of the current TDMAbased MAC to enable spatial reuse in multi-rate wireless networks. We model spa...
Chenguang Lu, Frank H. P. Fitzek, Patrick C. F. Eg...
In this paper we evaluate and compare five commercial off-the-shelf platforms for building converged serviceoriented architectures in an ambient computing environment. To this en...
Davy Preuveneers, Julien Pauty, Dimitri Van Landuy...