The paper is written jointly by two parties, computer scientists specializing in geovisualization and experts in forestry, who cooperated within a joint project. The authors tell ...
Gennady L. Andrienko, Natalia V. Andrienko, Richar...
Integer octagonal constraints (a.k.a. Unit Two Variables Per Inequality or UTVPI integer constraints) constitute an interesting class of constraints for the representation and solu...
Roberto Bagnara, Patricia M. Hill, Enea Zaffanella
We investigate the randomized and quantum communication complexity of the HAMMING DISTANCE problem, which is to determine if the Hamming distance between two n-bit strings is no l...
In this paper we analyse the performance of a relay based UMTS system in an urban environment using multiple hops on multiple frequency bands. Measurement based path loss, fading a...
Konstantinos Konstantinou, Muhammad Ali Imran, Cos...
We describe two different attacks against the iso/iec 9796-1 signature standard for RSA and Rabin. Both attacks consist in an existential forgery under a chosen-message attack: the...