Due to complexity, modern visualization techniques for large data volumes and complex interrelationships are difficult to understand for non-expert users and even for expert user...
A repository of task structures can reveal important latent knowledge about the development of a software system. Although approaches have been proposed to recover artifacts withi...
— Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes...
A hardware ef cient approach is introduced for elementary function evaluations in certain structured matrix computations. It is a comprehensive approach that utilizes lookup table...
Adapting to current context of usage is of fundamental importance for pervasive computing services. As the technology for acquiring contextual information is increasingly availabl...