The choice of which of the available strategies should be used within the Differential Evolution algorithm for a given problem is not trivial, besides being problem-dependent and...
—Sensing coverage and network connectivity are two fundamental issues in wireless sensor networks (WSNs). Due to resource constraints of sensor nodes, it may not be possible, or ...
Abstract. We present a new algorithm for upper bounding the maximum average linear hull probability for SPNs, a value required to determine provable security against linear cryptan...
This paper describes a scalable Web server array architecture which uses a caching policy called Probability Based Replacement (PBR) algorithm [5, 6]. The server array consists of...
Abstract. This paper introduces a novel method for online writer identification. Traditional methods make use of the distribution of directions in handwritten traces. The novelty o...