Concurrently with fast development of location aware technologies, many applications have been developing to exploit location data for serving people. However, a main challenge in...
Service-oriented architecture (SOA) making the interactions between applications much easier, but the service delay and unstable network will block the whole business process. Rep...
— User authentication is still heavily reliant on the use of passwords, and the security problems associated with passwords are becoming more and more serious. The main causes of...
Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee,...
Flash memory in various embedded systems such as the backing memory is frequently used in an active type of RFID reader. Because batteries are used in a shifting environment and s...
TaeHoon Kim, KwangMu Shin, TaeHoon Lee, KiDong Jun...
Coverage configuration is an important issue in large scale wireless sensor networks (WSNs). Existing coverage configuration methods are generally based on the concept of physical...