In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-...
Zhefan Jiang, Kanghee Lee, Sangok Kim, Hyunchul Ba...
Service-oriented computing and the ensuing science of services represent significant challenges to academia. As we come to grips with its many implications, we are slowly beginnin...
Sandeep Purao, Vijay K. Vaishnavi, John W. Bagby, ...
An exact analysis of the numerical errors being generated during the computation of the Zernike moments, by using the well-known `q-recursive' method, is attempted in this pa...
George A. Papakostas, Yiannis S. Boutalis, Constan...
The chess endgame is increasingly being seen through the lens of, and therefore effectively defined by, a data ‘model’ of itself. It is vital that such models are clearly faith...
Abstract— Encounter-based network is a frequentlydisconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information dissemina...