— This paper addresses the problem of managing a wireless sensor network with mobile managers. The mobile managers should be able to create their connectivity to the nodes they m...
—This paper describes a study of predicting machine availabilities and user presence in a pool of desktop computers. The study is based on historical traces collected from 32 mac...
—This paper proposes a new approach, segment-based path protection, which provides much more enhanced network resource utilization than the local protection scheme and achieves m...
Daniel Won-Kyu Hong, Choong Seon Hong, Woo-Sung Ki...
—When deploying collaborative applications such as Instant Messaging in ubiquitous computing environments significant enhancements can be afforded by offering additional context ...
Karl Quinn, Austin Kenny, Kevin Feeney, David Lewi...
—Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, rang...