In this paper we consider the solution of scheduling problems that are inherently over-subscribed. In such problems, there are always more tasks to execute within a given time fra...
This paper presents a fuzzy logic approach for switching multiple reference models, within the Model Reference Adaptive Control (MRAC) framework, in response to major changes in t...
Sukumar Kamalasadan, Adel A. Ghandakly, Khalid S. ...
Abstract: Firewalls are core elements in network security. However, managing firewall rules, especially for enterprize networks, has become complex and error-prone. Firewall filt...
Abstract. This paper estimates the minimal length of a binary probabilistic traitor tracing code. We consider the code construction proposed by G. Tardos in 2003, with the symmetri...
This paper presents the second edition of our multicast protocol designed to enable shared v irtual worlds. This secon d release was u nderta ken to prov ide an interaction method...