Abstract—We consider the problem of relay-assisted transmission for cellular networks. In the considered system, a source node together with n relay nodes are selected in a propo...
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
Background: Searching for similarities in protein and DNA databases has become a routine procedure in Molecular Biology. The Smith-Waterman algorithm has been available for more t...
In this paper, we describe a method for structural noun phrase disambiguation which mainly relies on the examination of the text corpus under analysis and doesn't need to int...
This paper focuses on knowledge empowered automated negotiation systems for buyer-centric multi-bilateral multi-attribute e-Procurement. We propose two knowledge empowered models,...