Biometric authentication based on human physical traits has recently been heavily studied; these biometric sources include face, hand geometry, voice, fingerprint, iris, retina, et...
Vit Niennattrakul, Dachawut Wanichsan, Chotirat An...
Instruction set simulators are common tools used for the development of new architectures and embedded software among countless other functions. This paper presents a framework th...
1 In multi-site distributed education (MSDE), video streams from multiple sites are available. To best utilize the limited screen space at each site, we develop a customizable, aut...
—The trends for pushing more operational intelligence towards network elements to achieve more context-aware and self-managing behavior often requires elements to gather network ...
John Keeney, David Lewis, Declan O'Sullivan, Antoi...
This paper presents a performance analysis of wireless ad-hoc networks, with ieee 802.11 as the underlying wireless lan technology. wlan has, due to the fair radio resource sharin...