The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...
This paper proposes a technique to foil DoS (Denial of Service) attacks. The proposed technique converts a static service to a relocating service and provides information of the n...
This paper establishes a Delaunay triangulation model for detecting text strings in an image. In this method, text regions are represented based on Delaunay triangles that can be e...
While tourism presents considerable potential for the use of new mobile technologies, we currently have little understanding of how tourists organise their activities or of the pro...
This research concerns the comparison of three different artificial evolution approaches for the design of cooperative behavior in a group of simulated mobile robots. The first an...