Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
This paper proposes the utilization of GSM logical channels (RACH, AGCH and TCH) and UMTS signaling (MIB and SIBs) of the Broadcast Channel to transmit a Cognitive Beacon Channel (...
Rodrigo Soule de Castro, Philippe Godlewski, Phili...
Person recognition using facial features, e.g., mug-shot images, has long been used in identity documents. However, due to the widespread use of web-cams and mobile devices embedd...
Computer games, often played with others, are a compelling pastime for many. However, they have been criticized for their mouse and keyboard or gamepad interactions, as they suppo...
Large-scale distributed data management with P2P systems requires the existence of similarity operators for queries as we cannot assume that all users will agree on exactly the sa...