Multiple combinations of hardware and network components can be selected to design an information technology (IT) infrastructure that satisfies performance requirements. The profe...
Context management in pervasive computing environments must reflect the specific characteristics of these environments, e.g. distribution, mobility, resource-constrained devices, o...
Roland Reichle, Michael Wagner, Mohammad Ullah Kha...
— Virtual Private Networks (VPN) provide a secure and reliable communication between customer sites over a shared network. With increase in number and size of VPNs, providers nee...
— This paper presents a method to determine the rough shape of an object. This is a step in the development of a ”One Click Grasping Tool”, a grasping tool of everyday-life o...
A problem of supervised approaches for text classification is that they commonly require high-quality training data to construct an accurate classifier. Unfortunately, in many real...