– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
We present a dynamic voltage scaling (DVS) technique that minimizes system-wide energy consumption for both periodic and sporadic tasks. It is known that a system consists of proc...
Online communities have grown to be an alternative form of communication for many people. This widespread growth and influence of the members of these communities in shaping the d...
Ebrahim Bagheri, M. Barouni-Ebrahimi, Reza Zafaran...
Individual, unaided human abilities are constrained. Media have helped us to transcend boundaries in thinking, working, learning, and collaborating by supporting distributed intel...
In the mobile learning context, it is helpful to consider context awareness and adaptivity as two sides of the same coin. The purpose of the adaptivity and context awareness is to...