—Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative act...
Sebastian Zander, Grenville J. Armitage, Philip Br...
—Data transmission in wireless mesh networks (WMNs) has a multi-hop nature where data is originated/destinated to one source/sink node. Therefore, the transmission capacity at th...
A new method for the simplification of flow fields is presented. It is based on continuous clustering. A well-known physical clustering model, the Cahn Hillard model which desc...
Graphical user interfaces are one of the more prevalent interface types which exist today. The popularity of this interface type has caused problems for users with poor vision. Be...
Julie A. Jacko, Armando Barreto, Gottlieb J. Marme...
Experience on a large banking application has highlighted expressive weaknesses in the standard (concrete) syntax of UML, resulting in models that are under-constrained. It es, ho...