Abstract. Conventional TCP in wireless environment has a lack of ability to differentiate the packet losses caused by network congestion from those caused by wireless link error. ...
Privacy and security has been considered as the top criterion for the acceptance of e-service adoption. In this paper, we proposed a privacy aware identity protection design that i...
Wireless Mesh Networks with static Transit Access Points (TAPs) have many advantages to connect different kinds of networks. While Mobile Ad hoc Networks still have many challenges...
Abstract. This paper describes metaheuristic algorithm based on simulated annealing method,which is a nature-inspired method, to analyze and improve the efficiency of the design of...
When wireless senor networks (WSNs) are deployed in hostile areas, they indeed need to be secured by security mechanisms. To do this, cryptographic keys must be agreed on by commun...
The GENIE project has built a Grid enabled framework that facilitates the integration, execution and management of component models for the study of the Earth system over millennia...
Matt J. Fairman, Andrew R. Price, Gang Xue, Marc M...
Abstract. We compared a support vector machine (SVM) with a back propagation neural network (BPNN) for the task of text classification of XiangShan science conference (XSSC) web do...
Software document repositories store artifacts produced in the course of developing software products. But most repositories are simply archives of documents. It is not unusual to ...
Yan Wu, Harvey P. Siy, Mansour Zand, Victor L. Win...
In this paper, we propose an automatic text classification method based on word sense disambiguation. We use “hood” algorithm to remove the word ambiguity so that each word is ...
Ying Liu, Peter Scheuermann, Xingsen Li, Xingquan ...