This work presents a study of cache replacement strategies designed for static web content. Proxy servers can improve performance by caching static web content such as cascading style sheets, java scr
Human action analysis and recognition is a relatively mature field, yet one which is often not well understood by students and researchers. The large number of possible variations in human motion and
Despite its high cost, the US healthcare system produces relatively short life spans, and is wasteful, inefficient and has serious safety and quality issues. While other industries have surmounted si
Declarative query interfaces to Sensor Networks (SN) have become a commodity. These interfaces allow access to SN deployed for collecting data using relational queries. However, SN are not confined to
Time-of-flight (TOF) cameras provide a depth value at each pixel, from which the 3D structure of the scene can be estimated. This new type of active sensor makes it possible to go beyond traditional 2
At a fundamental level, service-oriented crowdsourcing applies the principles of service-oriented architecture (SOA) to the discovery, composition and selection of a scalable human workforce. Service-
This user’s reference is a companion to the separate book also titled “Guide to Modelling and Simulation of Systems of Systems.” The principal book explicates integrated development environments to su
Multiprocessor platforms play important roles in modern computing systems, and appear in various applications, ranging from energy-limited hand-held devices to large data centers. As the performance r
Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overvie
RFID (radio frequency identification) tags are becoming ubiquitously available in object tracking, access control, and toll payment. The current application model treats tags simply as ID carriers and
Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples
Change detection using remotely sensed images has many applications, such as urban monitoring, land-cover change analysis, and disaster management. This work investigates two-dimensional change detect
Driven by the increasing demand for capacity and Quality of Service in wireless cellular networks and motivated by the distributed antenna system, the authors proposed a cooperative communication arch
The next-generation of wireless communications are envisioned to be supported by heterogeneous networks by using various wireless access technologies. The popular cellular networks and wireless local
Existing software applications should be redesigned if programmers want to benefit from the performance offered by multi- and many-core architectures. Performance scalability now depends on the possib
Description Logics (DLs) is a family of formalisms used to represent knowledge of a domain. They are equipped with a formal logic-based semantics. Knowledge representation systems based on description
Research in context-aware computing has produced a number of middleware systems for context management. However, development of ubiquitous context-aware applications is still a challenge because most
Over the last 50 years there have been an increasing number of applications of algebraic tools to solve problems in communications, in particular in the fields of error-control codes and cryptography.
Applications that require a high degree of distribution and loosely-coupled connectivity are ubiquitous in various domains, including scientific databases, bioinformatics, and multimedia retrieval. In
The research in content-based indexing and retrieval of visual information such as images and video has become one of the most populated directions in the vast area of information technologies. Social
With the increasing popularization of personal hand-held mobile devices, more people use them to establish network connectivity and to query and share data among themselves in the absence of network i
The Rhodes framework offers several advantages over other mobile frameworks. Some of the unique features of the Rhodes frameworks are as follows: - The only smartphone framework to offer support for t
Cooperative transmission aims to improve the reliability of wireless mobile communications through the use of diversity provided by additional relays assisting in the transmission between the source a
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clo
Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk ana
This work presents a full generic approach to the detection and recognition of traffic signs. The approach is based on the latest computer vision methods for object detection, and on powerful methods
These days, construction companies are beginning to be concerned about a potential labor shortage by demographic changes and an aging construction work force. Also, an improvement in construction safe
The ultimate goal of machines is to help humans to solve problems.Such problems range between two extremes: structured problems for which the solution is totally defined (and thus are easily programme
Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility a