Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
– A prototype Internet Research Support System is presented based on earlier work on the modeling of online reading behavior and evaluating the reading process and its outcomes. ...
Nasiroh Omar, Colin Higgins, Colin G. Harrison, Di...
Background: Modern high throughput experimental techniques such as DNA microarrays often result in large lists of genes. Computational biology tools such as clustering are then us...
Alain B. Tchagang, Alexander Gawronski, Hugo B&eac...
Designing complex multi-tier applications that must meet strict performance requirements is a challenging software engineering problem. Ideally, the application architect could de...
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...