— Since we can accumulate a huge amount of data including useless information in these years, it is important to investigate various extraction method of clusters from data inclu...
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...
— One of TCP’s critical tasks is to determine which packets are lost in the network, as a basis for control actions (flow control and packet retransmission). Modern TCP implem...
Topology Control (TC) is a well-studied technique used in wireless ad hoc networks to find energy-efficient and/or low-interference subgraphs of the maxpower communication graph....
Douglas M. Blough, Mauro Leoncini, Giovanni Resta,...
Methods for solving Distributed Constraint Optimization Problems (DCOP) have emerged as key techniques for distributed reasoning. Yet, their application faces significant hurdles...