—Although network-wide flooding in reactive routing protocols like AODV [1] facilitates the discovery of optimal routes, they engender large control overhead. Some efficient floo...
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
— Rate adaptation is one of the basic functionalities in today’s 802.11 wireless LANs (WLANs). Although it is primarily designed to cope with the variability of wireless channe...
Jaehyuk Choi, Jongkeun Na, Kihong Park, Chong-kwon...
— In this paper, we propose an original approach to control camera position and/or lighting conditions in an environment using image gradient information. Our goal is to ensure a...
Automatic test data generation helps testers to validate software against user requirements more easily. Test data can be generated from many sources; for example, experience of t...
Chartchai Doungsa-ard, Keshav P. Dahal, M. Alamgir...