We describe a method to retrieve images found on web pages with specified object class labels, using an analysis of text around the image and of image appearance. Our method dete...
Abstract—Covert channels aim to hide the existence of communication between two or more parties. Such channels typically utilise pre-existing (overt) data transmissions to carry ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
Personalized and context-aware services are of high interest for Mobile Network Operators (MNOs) to keep existing and win new subscribers. Although such services are already avail...
— In this paper we deal with online broadcasting and multicasting in a WDM optical network with shared light splitter bank. Our objective is to maximize the network throughput. S...
We describe a deterministic, polynomial time algorithm for finding edge-disjoint paths connecting given pairs of vertices in an expander. Specifically, the input of the algorith...