In an e-commerce system, security, in particular authentication, is of paramount importance. Public-key Infrastructure is often used to enforce authentication and the property of ...
One of the major challenges facing a present day game development company is the removal of bugs from such complex virtual environments. This work presents an approach for measuri...
An important feature of a modern mobile device is that it can position itself. Not only for use on the device but also for remote applications that require tracking of the device....
In this paper, we present a tree-partition algorithm for parallel mining of frequent patterns. Our work is based on FP-Growth algorithm, which is constituted of tree-building stag...
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...