— Third Generation (3G) Mobile Communication systems will provide enhanced high-speed data, multimedia, and voice services to mobile users. Beam forming techniques have been prop...
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Abstract – In order to fulfill the functional requirements of multimedia management systems while achieving the efficiency and reliability at the same time, we adopt the compone...
Shu-Ching Chen, Mei-Ling Shyu, Na Zhao, Chengcui Z...
-This paper describes the use of a Fuzzy Cognitive Map (FCM) to model disaster reconstruction, based on data collected from the cities of BAM and Baravat. The extended fuzzy cognit...
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...