Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
We consider a wireless sensor network in which sensors are grouped into clusters, each with its own cluster head (CH). Each CH collects data from sensors in its cluster and relays...
Video-on-demand over IP (VOD) is one of the best-known examples of “next-generation” Internet applications cited as a goal by networking and multimedia researchers. Without em...
Hongliang Yu, Dongdong Zheng, Ben Y. Zhao, Weimin ...
We present a new hardware synthesis methodology for guarded atomic actions (or rules), which satisfies performance-related scheduling specifications provided by the designer. The ...
Symbolic image computation is the most fundamental computation in BDD-based sequential system optimization and formal verification. In this paper, we explore the use of over-appr...