Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have bought to the forefront the seriousness of the security threat to this increasingly popular mean...
—Wireless Mesh Networks represent an interesting technology due to their reliability, broad coverage and relatively easy and inexpensive scalability. The architecture is mainly a...
—The problems of energy efficient sensor network configuration and local fusion of sensed data have been addressed separately in the previous works. In this paper, we propose t...
Xiaodong Wang, Demin Wang, Yun Wang, Dharma P. Agr...
Along with the widespread deployment of the third generation cellular networks, the fast-improving capabilities of the mobile devices, content and service providers are increasing...
Antonios G. Alexiou, Christos Bouras, Evangelos Re...
Reverse engineering legacy software systems often involves the employment of clustering algorithms that automatically decompose a software system into subsystems. The decompositio...