This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
— Underwater acoustic communication networks have attracted attention for its applications in many areas such as mine warfare, rapid environmental assessment or search and rescue...
An opportunistic network is a network where each node only has connectiviy with other nodes opportunistically. To disseminate data in this kind of network is a challenging task an...
—The WebInVivo project aims at providing automated support for clinical research on neglected diseases. It includes mechanisms for (a) sharing and reusing clinical trial assets, ...
Maria Beatriz Felgar de Toledo, Olga Nabuco, Marco...
—Topology control in a wireless sensor network is useful for ensuring that the network remains connected in the presence of nodes that exhaust their energy or become altogether d...
Waltenegus Dargie, Alexander Schill, Rami Mochaour...
We present a process calculus, CCA, for the modelling and verification of mobile systems that are context-aware. This process calculus is built upon the calculus of mobile ambien...
—Opportunistic networks represent one of the most interesting evolution of MANET paradigm. Generally speaking, opportunistic networks enable user communication in environments wh...
— In service-oriented environments, reputation-based service selection is gaining increasing prominence. We propose in this paper a social network-based approach to model and ana...
— Sensor networks are commonly used for security and surveillance applications. As sensor nodes have limited battery paower, computing, and storage resources, the energy efficie...
Andrei Gagarin, Sajid Hussain, Laurence Tianruo Ya...
We consider the problem of content extraction from online news webpages. To explore to what extent the syntactic markup and the visual structure of a webpage facilitate the extrac...