In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to comp...
Steven Noel, Sushil Jajodia, Brian O'Berry, Michae...
Abstract-- Simultaneous support of multiple delay-critical application sessions such as multiuser video streaming require a paradigm shift in the design of ad-hoc wireless networks...
Sachin Adlakha, Xiaoqing Zhu, Bernd Girod, Andrea ...
Abstract— Wavelength is one of the most important resources in Wavelength Division Multiplexing(WDM) networks. In optical routing, we are given a set of communication paths (or l...
We combine mixed integer linear programming (MILP) and constraint programming (CP) to solve planning and scheduling problems. Tasks are allocated to facilities using MILP and sche...
Folksonomies have shown interesting potential for improving information discovery and exploration. Recent folksonomy systems investigate on the use of tag assignments, which combi...
Fabian Abel, Nicola Henze, Daniel Krause, Matthias...