Cryptographic protocols can only be secure under certain inequality assumptions. Axiomatizing these inequalities explicitly is problematic: stating too many inequalities may impair...
This article addresses the ubiquitous topic of Quality of Service (QoS) aware connection provisioning in wavelength routed WDM optical networks. The impact of the connection setup...
Wissam Fawaz, Iyad Ouaiss, Ken Chen, Harry G. Perr...
In the past decade, significant progress has been achieved in developing generic primal heuristics that made their way into commercial mixed integer programming (MIP) solver. Exte...
C. Joncour, S. Michel, R. Sadykov, D. Sverdlov, Fr...
Fingerprinting is a well known approach for identifying multimedia data without having the original data present but what amounts to its essence or "DNA". Current approa...
The First Symposium on the Personal Web is colocated with CASCON 2010 and is sponsored by IBM CAS Research. This symposium includes key researchers and practitioners in a range of...
Mark H. Chignell, James R. Cordy, Joanna W. Ng, Ye...