The purpose of this this research is to suggest comprehensive pricing schemata that software developers can use in the integrated state of software uses. To do so, we have reviewe...
In this paper, authors attempt to shed light on the factors that influence the locations of bank branches in establishing a bank’s branch network from the angle of the network a...
The fingerprint verification methods include minutiae-based and image-based methods. The minutiae-based method has been frequently used, but it has limitations in performance. Thes...
Jong Ku Kim, Seung-Hoon Chae, Sung Jin Lim, Sung B...
In a smart building environment nomadic users can benefit from specialised contextsensitive services. These can increase productivity and offer an improved lifestyle for users. Th...
When recording extracellular neural activity, it is often necessary to distinguish action potentials arising from distinct cells near the electrode tip, a process commonly referre...
Dynamic frequency scaling (DFS) techniques for real-time embedded systems have been widely studied. However, most of the scheduling algorithms so far concern only special purpose ...
Today, honeypot operators are strongly relying on network analysis tools to examine network traces collected in their honeynet environment. The accuracy of such analysis depends o...
The McKIZ Aware Community will enable us to move the paradigm of an aware and assistive home to the development of an aware and assistive community infrastructure by incorporating...
Howard D. Wactlar, Robert Walters, John Bertoty, A...
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
—Governmental Transportation Authorities' interest in Car to Car and Car to Infrastructure has grown dramatically over the last few years in order to increase the road safet...
Raffaele Penazzi, Piergiorgio Capozio, Martin Dunc...