Replication on multiple nodes is an effective way to improve the availability in the P2P or grid environment. It is difficult to determine how many replicas can fulfill the user r...
The decoupling of producers and consumers in the publish/subscribe paradigm lends itself well to the support of mobile users who roam about the environment with intermittent netwo...
Many routing protocols for MANETs do not promote a balanced use of resources among the participating nodes, since they are designed to optimize other criteria, such as the number ...
The problem of spam is a classic “tragedy of the commons” [10]. We propose the Zmail protocol as a way to preserve email as a “free” common resource for most users, while ...
Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Moha...
Knowledge of the fine-grained location and orientation of devices on a surface can be used to enhance the surface-based computing tasks of mobile users in the home and workplace....
Albert Krohn, Michael Beigl, Mike Hazas, Hans-Wern...
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
We present an interaction device for navigating data structures or browsing menus using only one hand. It is especially designed for situations in which the user wears gloves that...
In on-demand multi-hop routing protocols for MANETs such as DSR and AODV, a fundamental requirement for peer-to-peer connectivity is to discover routes to a remote node via flood...
Dimitrios Koutsonikolas, Saumitra M. Das, Himabind...