In this paper, we propose internetworking strategy of WLAN and MANET. Both WLAN and MANET are based on IEEE 802.11 for MAC layer protocol while they adopt different mode, such as i...
Abstract. This paper presents a new fast and local method of 3D surface reconstruction for scattered data. The algorithm makes use of quasiinterpolants to compute the control point...
In order to complement the incomplete training audit trails, model generalization is always utilized to infer more unknown knowledge for intrusion detection. Thus, it is important ...
Since syntactically different URLs could represent the same resource in WWW, there are on-going efforts to define the URL normalization in the standard communities. This paper cons...
We discuss the deletion of a single vertex in a Delaunay tetrahedralization (DT). While some theoretical solutions exist for this problem, the many degeneracies in three dimensions...
Requests for application services that require large data space such as multimedia, game and database[1] have greatly increased. Nowadays those requests locomote for various servic...
Component-Based Development (CBD) is gaining popularity as an effective reuse technology. Components in CBD are mainly for interorganizational reuse, rather than intra-organization...
Product Line Engineering is being accepted as a representative software reuse methodology by using core assets and product line architecture is known as a key element of core asset...
Abstract. We present a parallel approach for optimizing surface meshes by redistributing vertices on a feature-aware higher-order reconstruction of a triangulated surface. Our meth...
Abstract. Though some studies involving general micro-mobility exist, micromobility research concerning a mobile node (MN) moving between Mobile Anchor Points (MAP) is lacking. In ...