Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
This paper proposes a method for scheduling and buffer management in differentiated services networks which is based on JoBS algorithm. JoBS differentiates traffic classes base on ...
Mohammad Hossien Yaghmaee, Ghazale Khojasteh Tousi
Abstract. This paper introduces an approach to address the problem of accessing conventional and geographic data from the Deep Web. The approach relies on describing the relevant d...
Helena Piccinini, Melissa Lemos, Marco A. Casanova...
Abstract The generation of traceability links or traceability matrices is vital to many software engineering activities. It is also person-power intensive, time-consuming, error-pr...
Senthil Karthikeyan Sundaram, Jane Huffman Hayes, ...
I examine the radical contextualists’ two main arguments for the semantic underdeterminacy thesis, according to which all, or almost all, English sentences lack context-independ...