Use-cases often capture the expected behaviors of a system and its components. During requirements analysis, it is important to understand and model the relationship among differe...
One of the limitations of wireless sensor nodes is their inherent limited energy resource. Besides maximizing the lifetime of the sensor node, it is preferable to distribute the e...
The retrieval process in image database systems is inherently different from the retrieval processin traditional (recordoriented)databasesystems.While thelatter canbe consideredan...
Several researches were conducted to Ad Hoc networks because of their facility of deployment, no need of an infrastructure and many other features. Thus, they still present many un...
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...