—Database technology is the significant part of computer science and technology, as the core technology of information management, database technology is widely used in the field...
: Relatively higher cost, worse extensibility of the monitoring points and weaker mobility are those disadvantages that widely exist in the wire data collection system of the tradi...
—The two-server model is quite promising for password based authentication, well suited for the setting of federated enterprises. However, none of the existing two-server passwor...
Abstract—In this paper, we propose efficient routing algorithms for collective communication in a newly proposed, versatile network, called a recursive dual-net (RDN). The RDN c...
—Simulation based training system can play an important role in education. It provides fruitful configurations with low cost of maintenance and further development compared to th...
—The project-based teaching mode is a method based on the educational theory of constructivism. Based on this mode, the paper discussed a new teaching practice, covering differen...
—Error concealment restores the visual integrity of image content that has been damaged due to a bad network transmission. Best neighborhood matching (BNM) is an effective image ...
This article describes the status and analyses the challenges of mobile application development, proposed a frame of component-based hierarchical development. Software is divided ...
under the research context of two axis digital control turntable, this paper has set up a mathematical model of control system of turntables. Proceeding from such model, it has ma...
—Peer-to-peer computing, involving the participation of thousands of general purpose, public computers, has established itself as a viable paradigm for executing looselycoupled, ...