The code dissemination in sensor networks is a useful technology to update a new code or change the functionality or bugs of the existing code. However, sensor networks are susceptible to various attacks because they ...
详细信息
Medical imaging has become a major tool in clinical experiments due to its ability in rapid diagnosis with visualization and quantitative assessment. Fractal and texture analysis are the computer techniques used to di...
详细信息
This report provides an overview of the field of contrast data mining and its applications, and offers a preview of an upcoming book on the topic. The importance of contrasting is discussed and a brief survey is given...
详细信息
A software component is defined as a unit of composition with contractually specified interfaces and explicit dependencies that may be independently deployed. Components form generic, re-usable software building block...
详细信息
The dynamical network topology is the source of most challenges in VANETs (Vehicle Ad hoc Networks). In urban area, however, it is feasible to meet the challenge by taking advantage of the heavy traffic. This paper pr...
详细信息
Traditionally, members of communities of practice collaborated through traditional means: word of mouth, conferences, lectures and hand written notes. However, the emergence of online environments, have led to the use...
详细信息
During software testing, defect prediction approaches measure current reliability status, forecasting future program failures, and provide information on how many defects need to be removed before shipping. Existing a...
详细信息
Sensors in a Wireless Sensor Network (WSN) are prone to failure, due to energy depletion, hardware failures, etc. Fault tolerance is one of the critical issues in WSNs. The existing fault tolerant mechanisms either co...
详细信息
We present a perspective on parser evaluation in a context where the goal of parsing is to extract meaning from a sentence. Using this perspective, we show why current parser evaluation metrics are not suitable for ev...
详细信息
Many collections of data contain items that are inherently similar. For example, archives contain files with incremental changes between releases. Long-range inter-file similarities are not exploited by standard appro...
详细信息
暂无评论