Many object-oriented software applications contain implicit business rules. Although there exist many approaches that advocate the separation of rules, the rules' connections ...
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
The number of potentially-related data resources available for querying -- databases, data warehouses, virtual integrated schemas -continues to grow rapidly. Perhaps no area has s...
Partha Pratim Talukdar, Marie Jacob, Muhammad Salm...
In image retrieval, most existing approaches that incorporate local features produce high dimensional vectors, which lead to a high computational and data storage cost. Moreover, ...
Abstract—In decentralized cognitive radio (CR) networks, enabling the radios to establish a control channel (i.e., “rendezvous” to establish a link) is a challenging problem....