Nowadays, due to the increased user requirements of the fast and reliable data management operation for mobile applications, major device vendors use embedded DBMS for their mobil...
In this chapter, we discuss a widely used fault-tolerant data replication model called virtual synchrony. The model responds to two kinds of needs. First, there is the practical qu...
Abstract— Wireless networked control systems have begun to gain acceptance during the last decade, largely due to the increased flexibility and lower costs they promise to provi...
James H. Taylor, Hazem M. S. Ibrahim, Jeff Slipp, ...
Many financial institutions have deployed CAPTCHAs to protect their services (e.g., e-banking) from automated attacks. In addition to CAPTCHAs for login, CAPTCHAs are also used to...
Shujun Li, S. Amier Haider Shah, M. Asad Usman Kha...
In many applications, we find large video collections from different genres where the user is often only interested in one or two specific video genres. So, when users are queryin...