— In Mobile Ad Hoc Networks (MANETs), the hidden and the exposed terminal problems affect the throughput of the Medium Access Control (MAC) protocols. Several MAC schemes have be...
In this paper we introduce a new method of motion blur identification that relies on the availability of two, differently exposed, image shots of the same scene. The proposed appr...
This paper introduces OAI static repository technology as a method by which publishers can expose their articlelevel metadata and thereby participate more fully in the wider infor...
Multicore hardware is making concurrent programs pervasive. Unfortunately, concurrent programs are prone to bugs. Among different types of concurrency bugs, atomicity violation bu...
In pervasive computing environments, service discovery facilitates users to access network services by automating tedious manual configurations. When network services becomes perv...