— In this paper, we investigate the channel selection strategy for secondary users in cognitive radio networks. We claim that in order to avoid the costly channel switchings, a s...
Increasingly, learning environments are opening the learner model to the user it represents. This paper describes a study in which students were able to create their own presentati...
Traditional nonlinear filtering techniques are observed in underutilization of blur identification techniques, and vice versa. To improve blind image restoration, a designed edg...
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
This report describes experiences of introducing executable acceptance testing in senior software engineering courses. Students in an agile environment completed a five-iteration ...