Component-based software structuring principles are now commonly and successfully applied at the application level; but componentisation is far less established when it comes to b...
Geoff Coulson, Gordon S. Blair, Paul Grace, Fran&c...
In this paper, we consider a class of sensor networks where the data is not required in real-time by an observer; for example, a sensor network monitoring a scientific phenomenon ...
Sameer Tilak, Nael B. Abu-Ghazaleh, Wendi Rabiner ...
Recently we presented a new approach [20] to the classification problem arising in data mining. It is based on the regularization network approach but in contrast to other methods...
We initiate the study of sublinear-time algorithms in the external memory model [Vit01]. In this model, the data is stored in blocks of a certain size B, and the algorithm is char...
Alexandr Andoni, Piotr Indyk, Krzysztof Onak, Roni...
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...