This paper looks at the problem of data prioritization, commonly found in mobile ad-hoc networks. The proposed general solution uses a machine learning approach in order to learn ...
Abstract—In this paper, we define meta-recognition, a performance prediction method for recognition algorithms, and examine the theoretical basis for its post-recognition score ...
Walter J. Scheirer, Anderson Rocha, Ross J. Michea...
Power Gating is effective for reducing leakage power. Previously, a Distributed Sleep Transistor Network (DSTN) was proposed to reduce the sleep transistor area by connecting all ...
In this paper, we describe the design and implementation of a distributed operating system for ad hoc networks. Our system simplifies the programming of ad hoc networks and extend...
Hongzhou Liu, Tom Roeder, Kevin Walsh, Rimon Barr,...
—Our study on the deployment topology and communication characteristics of wireless mesh enterprise networks (WMENs) leads to three critical security challenges: (a) deployment o...
Md. Abdul Hamid, Md. Shariful Islam, Choong Seon H...