— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
We show that traditional waveform-coding and 3-D modelbased coding are not competing alternatives but should be combined to support and complement each other. Both approaches are ...
A new synthesis technique for designing finite state machines with on-line parity checking is presented. The output logic and the next-state logic of the finite state machines are...
Chaohuang Zeng, Nirmal R. Saxena, Edward J. McClus...
Ensembles are often capable of greater prediction accuracy than any of their individual members. As a consequence of the diversity between individual base-learners, an ensemble wil...
Vladimir Nikulin, Geoffrey J. McLachlan, Shu-Kay N...
Abstract — Wireless frequency resources are often the limiting factor for WLAN throughput. Hence, wireless channel management is needed to mitigate co-channel interference and im...
Yongqiang Liu, William Wu, Bo Wang, Tao He, Su Yi,...