—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...
—The Smart Party is a ubiquitous computing application based on the Panoply middleware. The Smart Party allows attendees at a party to transparently participate in the selection ...
Kevin Eustice, A. M. Jourabchi, J. Stoops, Peter L...
—We consider the rate allocation problem for data aggregation in wireless sensor networks with two objectives: 1) maximizing the lifetime of a local aggregation cluster and, 2) a...
—Packet scheduling at the data link layer may impact significantly the overall performance of a wireless system using multiple antennas. In this paper, we propose a novel packet ...
– The standard ISIM-based authentication mechanism of IMS is only intended for mobile phones and cannot be used for fixed IMS clients on stationary devices without SIM cards. Thi...
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
In this paper we present a novel algorithm aiming at connecting members of a community equipped with mobile devices based on their location. Initially, these users are far from ea...
— Recently, the RFID tag system is paid attention to as an identification source. Each RFID tag is attached to some object. With the unique ID of RFID tag, a user identifies the ...
Toshihiro Hori, Tomotaka Wada, Yuuki Ota, Norie Uc...
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...