Most previously proposed mining methods on data streams make an unrealistic assumption that "labelled" data stream is readily available and can be mined at anytime. Howe...
We revisit a well studied linear algebraic problem, computing the rank and determinant of matrices, in order to obtain completeness results for small complexity classes. In partic...
Component-based software development heavily relies on the ability of reusing components from a library with as little effort as possible. Among others, valuable features for reus...
There is a growing demand for provisioning of different levels of quality of service (QoS) on Web servers to meet changing resource availability and satisfy different client requi...
Xiaobo Zhou, Yu Cai, Ganesh Godavari, C. Edward Ch...
This paper describes a method for hiding data inside printed text documents that is resilient to print/scan and photocopying operations. Using the principle of channel coding with...