The presence of Web spam in query results is one of the critical challenges facing search engines today. While search engines try to combat the impact of spam pages on their resul...
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
We propose a new schematic design for sending and receiving a digital video stream on the heterogeneous Internet environment such as a Gigabit Ethernet and a narrow bandwidth sate...
Yasuo Tsuchimoto, Mohammad Abdul Awal, Poompat Sae...
An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. In this paper we present an inno...
Layout analysis is a fundamental step in automatic document processing. Many different techniques have been proposed in literature to perform this task. These are broadly divided ...