Recently, 2DPCA and its variants have attracted much attention in face recognition area. In this paper, some efforts are made to discover the underlying fundaments of these method...
Shiguang Shan, Bo Cao, Yu Su, Laiyun Qing, Xilin C...
Self-adaptation is emerging as an increasingly important capability for many applications, particularly those deployed in dynamically changing environments, such as ecosystem moni...
Heather Goldsby, Peter Sawyer, Nelly Bencomo, Bett...
—Extensive studies on supporting voice traffic over wireless 802.11 networks have been carried out in the literature. Most of them were focused only on one hop infrastructure mo...
Side channel attacks are non-invasive attacks in which adversaries gain confidential information by passively observing the target computing device. Sensor nodes are particularly...
Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu,...
Ever more scientists are employing large-scale distributed systems such as grids for their computational work, instead of tightly coupled high-performance computing systems. Howev...
Alexandru Iosup, Omer Ozan Sonmez, Shanny Anoep, D...