Software components are becoming increasingly popular design and implementation technologies that can be plugged and played to provide user-enhanceable software. However, developi...
In this note we identify a phenomenon for processor sharing queues that is unique to ones with time-varying rates. This property was discovered while correcting a proof in Hampshi...
We give a tutorial overview of several geometric methods for dimension reduction. We divide the methods into projective methods and methods that model the manifold on which the da...
We propose a general, formal definition of the concept of malware (malicious software) as a single sentence in the language of a certain modal logic. Our definition al thanks to it...
ended abstract looks forward at which shared concepts and approaches are shaping future research in the field of location privacy, as well as reflecting on the broader achievement...