Questions of healthcare inequities have been of continuing concern to health researchers, planners, and policymakers. The answers to such questions can be difficult to interpret, ...
Donald J. Berndt, John W. Fisher, Rama V. Rajendra...
We describe a technique to detect the presence of computer users. This technique relies on sonar using hardware that already exists on commodity laptop computers and other electro...
Stephen P. Tarzia, Robert P. Dick, Peter A. Dinda,...
In a VoD(Video-on-Demand system), admission control that is used to serve multimedia data efficiently has to be performed by an accurate grasp of the condition of surplus resource...
In-Hwan Kim, Jeong-Won Kim, Seung-Won Lee, Ki-Dong...
The practical network performances of two commercial IEEE 802.11 compliant wireless local area networks (WLANs) are measured at the medium access control sublayer. A number of tes...
3D models are subject to a wide variety of processing operations such as compression, simplification or watermarking, which introduce slight geometric modifications on the shape. ...