—Several dynamic call admission control (CAC) schemes for cellular networks have been proposed in the literature to reserve resources adaptively to provide the desired quality of...
In cryptographic protocols, zero knowledge proofs are employed for a principal A to communicate some non-trivial information t to B while at the same time ensuring that B cannot de...
Effective information systems require the existence of explicit process models. A completely specified process design needs to be developed in order to enact a given business proce...
Laura Maruster, A. J. M. M. Weijters, Wil M. P. va...
Cholera (Vibrio cholerae) is endemic in southern Africa and frequently breaks out in epidemics along the eastern seaboard. Extensive resources are directed at combating cholera ye...
Gavin Fleming, Marna van der Merwe, Graeme McFerre...
A real-time database is composed of real-time objects whose values remain valid only within their validity intervals. Each object in the database models a real world entity. The f...