Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
Abstract. Our research team is developing a computer construction game called VirtualPrismaker based on the physical game Prismakertm . We have had to deal with all typical and ess...
In this article we report on applications and extensions of weighted graph theory in the design and control of communication networks. We model the communication network as a weig...
One of the most prominent issues involved in incremental software development is to decide upon the most appropriate software release plans taking into account all explicit and imp...
—With the development of the Internet, the need of city 3D data is rising more and more, and the emphasis shifts from analysis to the sharing of city 3D data and information over...