In this paper, we consider a joint beamforming, power, and channel allocation in a multi-user and multi-channel underlay multiple input…
In many popular applications like peer-to-peer systems, large amounts of data are distributed among multiple sources. Analysis of this data…
Top-k query is an important operation to return a set of interesting points in a potentially huge data space. It…
Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient…
Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of bumping up…
Elastic distortion of fingerprints is one of the major causes for false non-match. While this problem affects all fingerprint recognition…
This paper presents a systematic data-driven approach to assisting situational application development. We first propose a technique to extract useful…
Session management in distributed Internet services is traditionally based on username and password, explicit logouts and mechanisms of user session…
To implement the system to solve the joint problem of packet scheduling and self-localization in an underwater acoustic sensor network…
We propose a new design for large-scale multimedia content protection systems. Our design leverages cloud infrastructures to provide cost efficiency,…