Pervasive computing devices are gradually becoming increasingly prevalent in our everyday life, enabling the users in the physical world to interact with the digital world. Grid c...
Currently Configuration Management (CM) tool and Process Management (PM) tool are both largely applied in software organizations. However, neither of them can effectively support ...
Although traditional software metrics have widely been applied to practical software projects, they have insufficient abilities to measure a large-scale system’s complexity at h...
Yutao Ma, Keqing He, Dehui Du, Jing Liu, Yulan Yan
This paper argues about the partitioning in hardware/software co-design and suggests the methodology applying extreme programming to complement the co-design. This approach, contr...
Heeseo Chae, Dong-hyun Lee, Jiyong Park, Hoh Peter...
Through as an important part of service-oriented system architecture, service retrieval receives much attention from industry and academia and many methods have been proposed, the...
Bin Tang, Leqiu Qian, Ruzhi Xu, Yunjiao Xue, Hui T...
Faced with drawbacks of JPEG 2000 lossless coding in network application as far as manipulation flexibility is concerned, this paper proposes a differential approach of implementa...
K-anonymisation, as an approach to protecting data privacy, has received much recent attention from the database research community. Given a single table, there can be many ways t...
In this paper we propose an improved and efficient key pre-distribution scheme for wireless sensor networks. Our scheme significantly increases the storage efficiency and security...
Concurrently with fast development of location aware technologies, many applications have been developing to exploit location data for serving people. However, a main challenge in...