Many routing protocols for MANETs do not promote a balanced use of resources among the participating nodes, since they are designed to optimize other criteria, such as the number ...
The problem of spam is a classic “tragedy of the commons” [10]. We propose the Zmail protocol as a way to preserve email as a “free” common resource for most users, while ...
Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Moha...
Knowledge of the fine-grained location and orientation of devices on a surface can be used to enhance the surface-based computing tasks of mobile users in the home and workplace....
Albert Krohn, Michael Beigl, Mike Hazas, Hans-Wern...
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
We present an interaction device for navigating data structures or browsing menus using only one hand. It is especially designed for situations in which the user wears gloves that...
In on-demand multi-hop routing protocols for MANETs such as DSR and AODV, a fundamental requirement for peer-to-peer connectivity is to discover routes to a remote node via flood...
Dimitrios Koutsonikolas, Saumitra M. Das, Himabind...
Error resilient encoding in video communication is becoming increasingly important due to data transmission over unreliable channels. In this paper, we propose a new power-aware e...
Minyoung Kim, Hyunok Oh, Nikil D. Dutt, Alexandru ...
Internet worms have repeatedly revealed the susceptibility of network hosts to malicious intrusions. Recent studies have proposed to employ the underlying principles of worm propa...