To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
Abstract—Peer-to-Peer (P2P) systems are widely used for sharing digital items without structured metadata and in absence of any kind of digital rights management applied to the d...
Walter Allasia, Francesco Gallo, Marco Milanesio, ...
We present in this paper a web-based version of a Scrabble game, describing its architecture and some implementation details. This architecture makes possible a high degree of int...
Guillermo de Bernardo, Ana Cerdeira-Pena, Oscar Pe...
The overset grid methodology has significantly reduced time-to-solution of high-fidelity computational fluid dynamics (CFD) simulations about complex aerospace configurations....
M. Jahed Djomehri, Rupak Biswas, Mark Potsdam, Rog...
Parsing hand-drawn diagrams is a definitely complex recognition problem. The input drawings are often intrinsically ambiguous, and require context to be interpreted in a correct w...
Giovanni Casella, Gennaro Costagliola, Vincenzo De...