—In this paper, we study the performance of the IEEE 802.11 MAC protocol under a range of jammers that covers both channel-oblivious and channel-aware jamming. We study two chann...
Emrah Bayraktaroglu, Christopher King, Xin Liu, Gu...
: Assessing cognitive load on web search is useful for characterizing search system features and search tasks with respect to their demands on the searcher's mental effort. It...
We present a complete data acquisition and processing chain for the reliable inspection of industrial parts considering anisotropic noise. Data acquisition is performed with a str...
– This paper presents a proxy-based visual content repurposing approach, which is used to repurpose visual content dynamically for the transmission over heterogeneous networks an...
The increasing demand for group support in software has drawn more attention to the field of designing Group Support Systems. Notwithstanding all the research in this field the pr...