Abstract-- In recent years underwater survey and surveillance missions with more than a single Autonomous Underwater Vehicle (AUV) have become more common thanks to more reliable a...
Maurice F. Fallon, Georgios Papadopoulos, John J. ...
Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed that social networ...
Despite the growing popularity of Online Social Networks (OSNs), the workload characteristics of OSN servers, such as those hosting blog services, are not well understood. Understa...
Myeongjae Jeon, Jeaho Hwang, Youngjae Kim, Jae-Wan...
There has been something of an academic debate between proponents of two different kinds of computer self-efficacy: general computer self-efficacy ala Compeau and Higgins on the o...
Recent results seem to cast some doubt over the assumption that improvements in fused recognition accuracy for speaker recognition systems based on different acoustic features are...
Jia Min Karen Kua, Julien Epps, Mohaddeseh Nosrati...