Vehicular ad hoc networks (VANETs) are envisioned to provide us with numerous interesting services in the near future. One of the most promising applications is the dissemination ...
Suk-Bok Lee, Gabriel Pan, Joon-Sang Park, Mario Ge...
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
The success of Wikipedia as a large-scale collaborative effort has spurred researchers to examine the motivations and behaviors of Wikipedia’s participants. However, this resear...
Abstract. The health system is a complex system of systems – changes in agriculture, transportation, economics, family life, medical practices, and many other things can have a p...
Paul P. Maglio, Melissa Cefkin, Peter J. Haas, Pat...
Cognitive radio has the ability to sense the environment and adapt its behavior to optimize communication features, such as quality of service in the presence of interference and ...
Haleh Hosseini, Anis Izzati Ahmad Zamani, Sharifah...