— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
One of the unknowns of emailing is the time it will take the receiver to form and post a reply. Response times vary considerably, and the chronemics of email are an important non-...
An enterprise architecture (EA) identifies the main components of the organization, its information systems, the ways in which these components work together in order to achieve d...
Stephen H. Kaisler, Frank Armour, Michael Valivull...
Ad hoc cross-agency teams are often needed to deal with actual, imminent, or potential crises that involve multiple geographic or political jurisdictions or require coordinated ex...
Whereas the conventional applications mostly assume stationary or fixed users, more and more emphasis is placed on mobility, the need for people to stay connected while moving aro...
—Subvocal electromyogram (EMG) signal classification is used to control a modified web browser interface. Recorded surface signals from the larynx and sublingual areas below the ...
Design documents can be exchanged in business-tobusiness networks through Product Data Management (PDM) system integration. This rarely used approach provides new possibilities fo...
— This paper considers a formal object-oriented model for distributed computing. Object orientation appears as a leading framework for concurrent and distributed systems. However...
This paper presents a novel approach to design and develop an assembly and execution shell for multiagent applications based on the concept of a mission. A mission is a live evolv...
Glenn T. Jayaputera, Arkady B. Zaslavsky, Seng Wai...
Bluetooth is a universal radio interface for short-range wireless networks. The basic Bluetooth network topology is a single-hop star-shaped piconet. Several such piconets can be ...