The known methods for constructing complete sets of mutually orthogonal frequency squares all yield one of two parameter sets. We show that almost all these constructions can be d...
In this note, we show that a proposed secure broadcasting scheme is insecure. We also present a modified scheme to overcome this weakness. The modified scheme has the extra adva...
In early phases of the software cycle, requirements prioritization necessarily relies on the specified requirements and on predictions of benefit and cost of individual requiremen...
Abstract The purpose of this article is to analyze and compare two standard portfolio insurance methods: Option-based Portfolio Insurance (OBPI) and Constant Proportion Portfolio I...
The goal of this paper is to foster discussions on future directions for QoS related research. The paper takes the viewpoint of an operator; as an example it presents the topology,...