Your shopping cart is empty!
Hi there! Click one of our representatives below and we will get back to you as soon as possible.
A new fuzzy filter is presented for the noise reduction of images corrupted with additive noise. The..
Availability of services in a Grid Computing system is a security concerned that has received enormo..
Positioning in wireless networks is today mainly used for yellow page services. Yet, its importance ..
In this paper, we present two forwarding protocols for mobile wireless networks of selfish individua..
In this paper, we study a group key agreement problem where a user is only aware of his neighbors wh..
the aspect of malware, since some sophisticated malware that can bypass the signature detectio..
Ad hoc network is an autonomous system that does not require a pre-established infrastructure. Nodes..
By these days, most companies are more aware of than ever in providing quality of services over the ..
Semantic Web is an emerging area to augment human reasoning. Various technologies are being develope..
Size-based scheduling with aging has been recognized as an effective approach to guarantee fairness ..
Abstract—We propose a highly scalable cluster-based hierarchical trust management protocol for wirel..
Packet classification is a core function in network and security systems; hence, hardware-based solu..
XML is commonly supported by SQL database systems. However, existing mappings of XML to tables can o..
Cloud computing promises a scalable infrastructure for processing big data applications such as medi..