—Students are difficult to get an effective way to master essential knowledge of J2EE course because they are lack programming experiments and teaching content is too much. In th...
—In this paper, we present a new spectrum-hole prediction model for cognitive radio (CR) systems based on the IEEE 802.11 wireless local areas networks. We have also analyzed the...
—The Service-Oriented Architecture (SOA) leverages ice abstraction to enable the development of modular, loose-coupled and distributed applications. In order to use such an archi...
—OPhone is an open source platform in intelligent terminal released by China Mobile. With the increase of various applications based on the platform, OPhone education is becoming...
Phone simulator is a simulation tool running on PC which can test debug phone software. It also provides front graphical user interface (GUI) like the true phone’s LCD. Develope...
—This paper introduces several new guiding ideologies in “the Principle of Computer Organization” course reform, based on the purpose of application-oriented personnel traini...
—The conventional teaching model is broken in Mode CDIO, in which, with the carrier of project, the educational idea based on project-learning and the principle of teaching integ...
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
—The relevance of instruction parallelization and optimal event scheduling is currently increasing. In particular, because of the high amount of computational power available tod...
—Dynamic resource allocation has the potential to provide significant increases in total revenue in enterprise systems through the reallocation of available resources as the dem...