Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Virtual Private Networks (VPNs) feature notable characteristics in structure and traffic patterns that allow for efficient resource allocation. A strategy that exploits the underl...
Satish Raghunath, Shivkumar Kalyanaraman, K. K. Ra...
— Automotive theft has been a persisting problem around the world and greater challenge comes from professional thieves. In this paper, we present an automotive security system t...
Huaqun Guo, H. S. Cheng, Yong Dong Wu, J. J. Ang, ...
Semantic systems for the representation of declarative knowledge are usually unconnected to neurobiological mechanisms in the brain. In this paper we report on efforts to bridge t...
The most controversial part of genetic programming is its highly disruptive and potentially innovative subtree crossover operator. The clearest problem with the crossover operator...