Reusability is one of the most prominent service principles that can reduce cost of solution ownership when design services for reuse. The concept of reuse is supported by and can enable a number of complementary serv...
详细信息
Malicious user behavior that does not trigger access violation or data leak alert is difficult to detect. Using the stolen login credentials, the intruder doing espionage will first try to stay undetected, silently co...
详细信息
Rope is a tree-based data structure providing performance enhancements in string concatenation operations in applications such as text editors. Even though collaborative text editing has become one of the major applic...
详细信息
Lightweight image encryption has become a critical area of cryptography, especially for resource-constrained devices like those used in the Internet of Things (IoT). Chaotic maps, known for their sensitivity to initia...
详细信息
Understanding the behavioural aspects and functional attributes of an existing software system is an important enabler for many softwareengineering activities including software maintenance and evolution. In this pap...
详细信息
There has been considerable interest in teaching "coding" to primary school aged students, and many creative "Initial Learning Environments" (ILEs) have been released to encourage this. Announcemen...
详细信息
This paper presents data folding as a method for rearranging image data in a manner which allows the practical application of the DCT to expand beyond the third dimension. Additionally, the design of the quantisation ...
详细信息
On social network platforms, users who can greatly affect other users through their posts are called opinion leaders. The discovery of opinion leaders has great significance for precision advertising, social analysis ...
详细信息
A fast algorithm(fade) for the 2D drawing, geometric clustering and multilevel viewing of large undirected graphs is presented. The algorithm is an extension of the Barnes-Hut hierarchical space decomposition method, ...
详细信息
In recent years, a lot of studies have been devoted to make communications possible between the nodes in the disconnected network scenarios, such as delay-/disruption-tolerant network (DTN). However, many DTN scenario...
详细信息
暂无评论