This paper presents two contributions: A set of routines that manipulate instances of stochastic programming problems in order to make them more amenable for different solution ap...
The most efficient technique for protecting the using Frobenius algorithms for scalar multiplication on Koblitz curves against the Side Channel Attacks seems to be the multiplier ...
Fuel cell vehicles (FCVs) running on hydrogen do not cause local air pollution. Depending on the energy sources used to produce the hydrogen they may also reduce greenhouse gases ...
The growth of packet-based voice services is leading to integration of voice and other services over packet switched data networks. This paper explores a possible path that the te...
This paper describes the presumed-either two-phase commit protocol. Presumed-either exploits log piggybacking to reduce the cost of committing transactions. If timely piggybacking ...