Many researchers and practitioners in user experience design have turned towards social sciences to find ways to understand the social contexts in which both users and technologie...
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
This paper presents our design and experiment of a computer-assisted class laboratory on vectors in high-school. Our main goal is to improve the acquisition on notions by all pupi...
The paper describes the model, implementation and experimental evaluation of a distributed Kohonen Neural Network application (Kohonen Application). The aim of this research is to...
: Although sensor-based coverage is a skill which is applicable to a variety of robot tasks, its implementation has so far been limited, mostly by the physical limitations of tradi...