Abstract—Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through se...
Virginia N. L. Franqueira, Pascal van Eck, Roel Wi...
Internet based mobile ad hoc networks (IMANETs) have several limitations to fulfill users' demands to access various kinds of information such as limited accessibility to the...
Sunho Lim, Seung-Taek Park, Wang-Chien Lee, Guohon...
In this paper, we presented an image search service for mobile users. It can be used to acquire related information by taking and sending pictures to the server, for example, gett...
The power consumption of video enabled mobile devices is an ongoing challenge. The computational burden caused by the motion estimation process involved in video compression is th...
As Chinese is not alphabetic and the input of Chinese characters into computer is still a difficult and unsolved problem, voice retrieval of information becomes apparently an imp...