Cellular telephony systems, where locations of mobile users are unknown at some times, are becoming more common. In such systems, mobile users are roaming in a zone and a user repo...
Motivated by the need to study traffic flow affected by incidents we consider M/M/C queueing system where servers operate in a Markovian environment. When a traffic incident hap...
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
When donating money to a (say, charitable) cause, it is possible to use the contemplated donation as a bargaining chip to induce other parties interested in the charity to donate ...
The main resarch in sensor networks has been focused on minimizing power consumption of sensors to maximize network life time. In some critical applications, however, the most impo...
Bo-Hyung Lee, Hyung-Wook Yoon, Jongho Park, Min Yo...