In this paper we present a practical heuristic attack on the Ko, Lee et al. key exchange protocol introduced at Crypto 2000 [10]. One of the ideas behind our attack is using Dehorn...
Alexei G. Myasnikov, Vladimir Shpilrain, Alexander...
The major objective of this paper is to deploy an effective evolutionary algorithm (EA) for the congestion problem in connection-oriented networks. The network flow is modeled as n...
In this paper we investigate the idea of using an ORM model as a starting point to derive an activity model, essentially providing an activity view on the original ORM model. When ...
Henderik Alex Proper, Stijn Hoppenbrouwers, Theo P...
Is it possible to teach dynamic polymorphism early? What techniques could facilitate teaching it in Java. This panel will bring together people who have considered this question a...
Joseph Bergin, Eugene Wallingford, Michael E. Casp...
Enterprise applications need to be highly available and scalable. In the past, this has required “stateless” applications, which essentially require the application to manage ...