Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruptio...
The ability of sensor nodes to enter a low power sleep mode is very useful for extending network longevity. We show how adversary nodes can exploit clustering algorithms to ensure ...
Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrish...
Recently, Multimedia Broadcast Multicast Service (MBMS) has been specified by 3GPP as a Release 6 feature in order to meet the increasing demands of multimedia download and streami...
Junaid Afzal, Thomas Stockhammer, Tiago Gasiba, We...
The paper considers a stylized model of a dynamic assortment optimization problem, where given a limited capacity constraint, we must decide the assortment of products to offer to...
Paat Rusmevichientong, Zuo-Jun Max Shen, David B. ...
CT-angiography is a well established medical imaging technique for the detection, evaluation and therapy planning of intracranial aneurysms. Different 3D visualization algorithms s...
Sabine Iserhardt-Bauer, Peter Hastreiter, Bernd To...