In open environments, such as mobile peer-to-peer systems, participants may need to access resources from unknown users. A critical security concern in such systems is the access ...
The success of BitTorrent has fostered the development of variants to its basic components. Some of the variants adopt greedy approaches aiming at exploiting the intrinsic altruis...
— We propose a new multiple description (MD) coder design based on the Adaptive Multi-Rate Wideband (AMRWB) coder that can support transcoding-free communication between an ad-ho...
—1 In ISM bands, many wireless protocols proliferate such as 802.11, Bluetooth, and ZigBee. However, these incompatible protocols create complex coexistence and connectivity prob...
Jiwoong Lee, Jeonghoon Mo, Tran Minh Trung, Jean C...
Abstract. The paper addresses an important challenge for the automatic processing of English written text: understanding noun compounds’ semantics. Following Downing (1977) [1], ...