Abstract. In this paper, we propose a mechanism to eliminate the performance anomaly of IEEE 802.11b. Performance anomaly happens when nodes that have different transmission rates...
New Web applications are rapidly moving from stand-alone systems to distributed applications that need to interoperate with third party systems, such as external Web services or le...
In this paper, as a step towards the ultimate aim of developing an evoting system that would be likely to gain and retain the trust of the general voting public, we describe a des...
An appealing feature of interior methods for linear programming is that the number of iterations required to solve a problem tends to be relatively insensitive to the choice of in...
There are many detectors for simple Least Significant Bit (LSB) steganography in digital images, the most sensitive of which make use of structural or combinatorial properties of ...