In mobile-AdHoc networks (MANETs), many applications need the support of layer-structure. Clustering solution is the most widely used layerstructure and the choosing of clusterhead...
In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustwo...
Although many face detection algorithms have been introduced in the literature, only a handful of them can meet the real-time constraints of mobile devices. This paper presents th...
Mohammad Rahman, Jianfeng Ren, Nasser D. Kehtarnav...
Small computing devices are everywhere changing the way people communicate and interact, however applications for these devices are developed more or less with the same tools used...