This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
This article presents a new trend in computerized medical image analysis of breast cancer features, existing in mammograms (grey scale 2D images), based on recent approaches of th...
Radiology, which deals with medical images for diagnosis purposes, has seen a lot of improvements during the last decades thanks to information technology. The migration from stud...
RFID data are usually regarded as streaming data that are huge and change frequently because they are gathered continuously by numerous readers. RFID middleware filters the data a...
Nowadays, path prediction is being extensively examined for use in the context of mobile and wireless computing towards more efficient network resource management schemes. Path pr...
Wireless sensor networks (WSNs) constitute a new pervasive and ubiquitous technology. They have been successfully used in various application areas and in future computing environ...
To support QoS guarantee and resource usage in heterogeneous access network environments more efficiently (UMTS, WIMAX, WLAN DVB-T, DVB-H), there is the challenge of automated con...