Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
We develop a game theoretic framework for effective and adaptive inter-cell interference management in the OFDMA-based WiMAX/3GPP-LTE systems. Such approach requires no fixed spe...
Yingda Chen, Koon Hoo Teo, Shalinee Kishore, Jinyu...
Metadata are widely used in order to fully exploit information resources available on corporate intranets or the Internet. The Resource Description Framework (RDF) aims at facilit...
Sofia Alexaki, Vassilis Christophides, Gregory Kar...
Most CBR systems rely on a fixed library of cases, where each case consists of a set of facts specified in advance. This paper describes techniques for dynamically extracting case...
This paper describes a method allowing the automatic multi-texturing and simulation of surface imperfections based on a cellular network. In this representation, networks of conne...