RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
We propose a predictive location based relaying for hybrid cellular and ad-hoc systems that can provide interference minimization to uplink transmission. In the case of dense netw...
Conference keys are secret keys used by a group of users commonly and with which they can encipher (or decipher) messages such that communications are secure. Based on the Diffie ...
Using simulation environments to support mobile distributed application development has many benefits. Since mobile devices can be modeled as autonomous intelligent agents, the mu...
In this paper, agent based process management model is proposed, which is for the process management of knowledge worker and service workers in order to establish the basis for th...
The 4th generation mobile communication system certainly will have a lot of improvement such as supporting higher multimedia loading, offering faster transmission rate, and the im...
Tin Yu Wu, Diego Chung, Chi-Yuan Chen, Han-Chieh C...
Wireless Sensor Networks (WSNs) have been widely used in environment monitoring to collect useful information. Packet broadcasting is an essential function for establishing a comm...
In this paper, we propose NTS6, an IPv6 based Network Topology Service system, which provides a Query and Response Service of Network Topology Information between any pair of host...
Lin Cong, Bo Yang, Yang Chen, Guohan Lu, Beixing D...
Swarm Intelligence (SI) inspired routing algorithms have become a research focus in recent years due to their self-organizing nature, which is very suitable to the routing problem...
Jin Wang, Brian J. d'Auriol, Xiaoling Wu, Young-Ko...
The Four Legged League is a division of the RoboCup initiative that uses Sony AIBOTM robots to further robotics research. Most participants implement vision systems that use the c...
Michael S. Zehmeister, Yang Sok Kim, Byeong Ho Kan...