Guest Editorial: Intelligent Distributed Computing
Why would we get attacked? An analysis of attacker’s aims behind DDoS attacks
Design of a quadrocopter with PID-controlled fail-safe algorithm
The use of mobile phones to monitor the status of patients with Parkinson’s disease
Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key
On the Optimality of Route Selection in Grid Wireless Sensor Networks: Theory and Applications