With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
As valuable software systems get old, reverse engineering becomes more and more important to the companies that have to maintain the code. Clustering is a key activity in reverse ...
Abstract-- Most user cooperation protocols work in a timesharing manner, where each user transmits its own message and relays for the other at different segments of a time slot. We...
Vajnovszki recently developed a loopless algorithm [Inform. Process. Lett. 68 (1998) 113] to enumerate Gray codes for binary trees, and then Korsh and Lafollette gave a loopless a...
Research into embedded sensor networks has placed increased focus on the problem of developing reliable and flexible software for microcontroller-class devices. Languages such as ...