—The Verifying Compiler (VC) project is a core component of the Dependable Systems Evolution Grand Challenge. The VC offers the promise of automatically proving that a program or...
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
—Exploiting mobility to enhance the performance of wireless sensor networks (WSNs), in terms of connectivity, coverage, and lifetime elongation, has recently been the focus of se...
Many applications make use of named entity classification. Machine learning is the preferred technique adopted for many named entity classification methods where the choice of feat...
Opportunistic augmentation denotes connecting a personal mobile device to another device to gain a transient advantage for the user. For example, a mobile phone user might borrow ...
John J. Barton, Stina Nylander, Fopefolu Folowosel...