The ability to limit unsolicited traffic in the Internet is important to defy DDoS attacks and to contain the spread of worms and viruses. The concept of capabilities, which requir...
: A newly emerging protocol for storage networking, iSCSI [1,2], was recently ratified by the Internet Engineering Task Force [3]. The iSCSI protocol is perceived as a low cost alt...
There has been a lot of work on localization for sensor networks. Most localization schemes assume an already deployed network. Very little research has been done for active senso...
The scheme of real time streaming video is one of the newcomers in wireless data communication, raising a number of new requirements in both telecommunication and data communicati...
Antonios G. Alexiou, Dimitrios Antonellis, Christo...
Fuzzy Connectedness is an important image segmentation routine for image processing of medical images. It is often used in preparation for surgery and sometimes during surgery. It...