To facilitate the processes of e-learning resource description, discovery and reuse, e-learning objects should be appropriately described and classified using standard metadata th...
Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequence...
Multi-device user interface design mostly implies creating a suitable interface for each targeted device, using a diverse set of design tools and toolkits. This is a time consumin...
Evolving recurrent neural networks for behavior control of robots equipped with larger sets of sensors and actuators is difficult due to the large search spaces that come with the ...
— This paper studies TCP performance over multihop wireless networks that use the IEEE 802.11 protocol as the access method. Our analysis and simulations show that, given a speci...