Learn More
Due to the widespread availability of 802.11-compliant devices, the 802.11 ad-hoc mode appears especially suited to set up mobile ad-hoc networks (MANETs). In practice, creating a MANET is challenging because typical mobile devices do not implement the configuration, routing, and name resolution functions required to operate in an ad-hoc scenario. Software(More)
The proliferation of broadband Internet connections has lead to an almost pervasive coverage of densely populated areas with private wireless access points. To leverage this coverage, sharing of access points as Internet up-links among users has first become popular in communities of individuals and has recently been adopted as a business model by several(More)
Wireless sensor networks are going to allow for ubiquitous health monitoring, improving users' well-being, the healthcare system, and helping to quickly react on emergency situations. Meeting the strict security needs of these ubiquitous medical applications is a big challenge, since safety and privacy of medical data has to be guaranteed all the way from(More)
INTRODUCTION During the last decades a large body of data has been accumulated indicating omega-3 fatty acids to exert beneficial effects on the prognosis of patients with cardiovascular disease. Especially, omega-3 fatty acids are regarded to be effective in reducing the risk of sudden cardiac death after acute myocardial infarction. However, treatment of(More)
Network emulation brings together the strengths of network simulation (scalability, modeling flexibility) and real-world software prototypes (realistic analysis). Unfortunately network emulation fails if the simulation is not real-time capable, e.g., due to large scenarios or complex models. So far, this problem has generally been addressed by providing(More)
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in such networks quintessentially depends on mechanisms to verify the authenticity of network traffic and the identity of communicating peers. A major challenge to achieve this(More)
AIMS We sought to assess the effect of clopidogrel on clinical events 1 year after discharge in survivors of ST-elevation myocardial infarction (STEMI) in clinical practice. METHODS AND RESULTS We analysed data of consecutive survivors of acute STEMI and either concomitant therapy with aspirin or aspirin plus clopidogrel at discharge, who were(More)
To assess gender-based differences in presentation and outcome after non-ST-elevation myocardial infarction (NSTEMI) in clinical practice, this study examined data from the Acute Coronary Syndrome registry, which enrolled 16,817 patients from 2000 through the end of 2002, 6,358 of them with NSTEMIs (34.1% women). Women with NSTEMIs were 7.5 years older, had(More)
In clinical practice, we found no significant difference between atorvastatin therapy or other statin therapies in the clinical outcomes of patients with acute coronary syndromes receiving clopidogrel therapy. In patients receiving atorvastatin therapy, clopidogrel therapy was associated with a significant decrease in mortality and stroke during univariate(More)
A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thing-to-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this(More)