Many programs exploit shared-memory parallelism using multithreading. Threaded codes typically use locks to coordinate access to shared data. In many cases, contention for locks r...
Nathan R. Tallent, John M. Mellor-Crummey, Allan P...
—Wireless sensor networks enable large amount of surveillance applications especially for critical and even hostile environments, for example, the sea monitoring. In OceanSense, ...
Kebin Liu, Zheng Yang, Mo Li, Zhongwen Guo, Ying G...
—There has recently been a great deal of interest in the development of algorithms that objectively measure the integrity of video signals. Since video signals are being delivere...
—Recent years have witnessed the deployments of wireless sensor networks in a class of mission-critical applications such as object detection and tracking. These applications oft...
Social network analysis became a common technique used to model and quantify the properties of social interactions. In this paper, we propose an integrated framework to explore th...