You are currently viewing a new version of our website. To view the old version click .

Computers, Volume 4, Issue 2

June 2015 - 5 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (5)

  • Article
  • Open Access
1 Citations
7,561 Views
21 Pages

22 May 2015

As smartphones become widespread, a variety of smartphone applications are being developed. This paper proposes a method for indoor localization (i.e., positioning) that uses only smartphones, which are general-purpose mobile terminals, as reference...

  • Article
  • Open Access
9 Citations
7,683 Views
13 Pages

Semi-Automatic Image Labelling Using Depth Information

  • Mostafa Pordel and
  • Thomas Hellström

6 May 2015

Image labeling tools help to extract objects within images to be used as ground truth for learning and testing in object detection processes. The inputs for such tools are usually RGB images. However with new widely available low-cost sensors like Mi...

  • Article
  • Open Access
3 Citations
8,049 Views
29 Pages

Error and Congestion Resilient Video Streaming over Broadband Wireless

  • Laith Al-Jobouri,
  • Ismail A. Ali,
  • Martin Fleury and
  • Mohammed Ghanbari

21 April 2015

In this paper, error resilience is achieved by adaptive, application-layer rateless channel coding, which is used to protect H.264/Advanced Video Coding (AVC) codec data-partitioned videos. A packetization strategy is an effective tool to control er...

  • Article
  • Open Access
12 Citations
8,470 Views
26 Pages

A Dynamic Reputation Management System for Mobile Ad Hoc Networks

  • Eric Chiejina,
  • Hannan Xiao and
  • Bruce Christianson

17 April 2015

Nodes in mobile ad hoc networks (MANETs) are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, a node may decide to act sel...

  • Article
  • Open Access
13 Citations
11,147 Views
26 Pages

A Secure System Architecture for Measuring Instruments in Legal Metrology

  • Daniel Peters,
  • Michael Peter,
  • Jean-Pierre Seifert and
  • Florian Thiel

24 March 2015

Embedded systems show the tendency of becoming more and more connected. This fact combined with the trend towards the Internet of Things, from which measuring instruments are not immune (e.g., smart meters), lets one assume that security in measuring...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X