Digital signage, sometimes known as a Digital Communications Network (DCN) or private plasma screen network, has been little researched to date. This paper puts forward the view t...
Andrew Newman, Charles Dennis, Len-Tiu Wright, Tam...
As one of the crucial problems in watermarking, robustness against geometric distortion and JPEG compression becomes more than challenging and problematic. In this paper, a robust...
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance hav...
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
A novel breadth-first based structural clustering method for graphs is proposed. Clustering is an important task for analyzing complex networks such as biological networks, World ...
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Pulse singularities with variable amplitudes appear in the corresponding positions of ignition coil primary current waveform when insulation fault occurs during the ignition proce...
The content and searching method of knowledge base are lack of the consideration of user requirements, it is difficult for the user to select the knowledge satisfy with the user r...