Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
For many performance analysis problems, the ability to reason across traces is invaluable. However, due to non-determinism in the OS and virtual machines, even two identical runs ...
It has been shown that IEEE 802.11 DCF medium access control (MAC) protocol may not be suitable for multihop wireless networks due to its relatively low throughput and severely un...
Knowledge-mapping tools enable users to quickly identify relevant information and expertise. This paper discusses a number of natural-language phenomena that limit the performance...
Anjo Anjewierden, Willem-Olaf Huijsen, Marjan Groo...
Typical speech enhancement methods, based on the short-time Fourier analysis-modification-synthesis (AMS) framework, modify only the magnitude spectrum and keep the phase spectru...