Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...
We show how quantified constraints expressed in a sub-language of first-order logic, againstashareddatamodelthatisfreetoevolve, provideanexcellentwayof transporting domain-specific...
Kit-ying Hui, Peter M. D. Gray, Graham J. L. Kemp,...
Abstract: Watching sports is a favorite pastime of many consumers. A more nomadic life style makes the traditional spectating venues unavailable. Designing a sports spectator exper...
: This paper presents a Multimedia Message Transmitter Tool (MMTT) that provides businesses with the opportunity to use Bluetooth wireless connectivity delivering the relevant info...
Sahar A. Idwan, Suad Alramouni, Mosleh Al-Adhaileh...
Abstract— In this paper we show that, despite some disadvantageous properties of radio frequency identification (RFID), it is possible to localize a mobile robot quite accuratel...
Philipp Vorst, Sebastian Schneegans, Bin Yang, And...