In case of natural disasters or intentional attacks, telecommunication networks often get heavily damaged and current resilience schemes have proven to be insufficient for rapid r...
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Multicore processors have not only reintroduced Non-Uniform Memory Access (NUMA) architectures in nowadays parallel computers, but they are also responsible for non-uniform access ...
Database queries, in particular, event-driven continuous queries, are useful for many pervasive computing applications, such as video surveillance. In order to enable these applic...
—In this contribution, the Fisher-Bingham-5 (FB5) probability density function (pdf) is used to model the shape of the direction power spectral density function (psdf) of individ...
Xuefeng Yin, Lingfeng Liu, Daniel K. Nielsen, Troe...