—To date many activity spotting approaches are static: once the system is trained and deployed it does not change anymore. There are substantial shortcomings of this approach, sp...
Since the inception of service-oriented computing paradigm, we have witnessed a plethora of services deployed across a broad spectrum of applications, ranging from conventional RP...
We propose Virtual Full Replication by Adaptive segmentation (ViFuR-A), and evaluate its ability to maintain scalability in a replicated real-time database. With full replication ...
: Authentication based on biometrics became significantly important over the last years. Privacy and security concerns arise by the extensive deployment of biometrics. The used bio...
Robust channel estimation scheme is essential for pulse-shaping OFDM systems in the multipath mobile environment. This paper proposes three types of channel estimation schemes for ...