This paper describes the context-aware mobile tourist application COMPASS that adapts its services to the user’s needs based on both the user’s interests and his current contex...
Mark van Setten, Stanislav Pokraev, Johan Koolwaai...
The equality logic with uninterpreted functions (EUF) has been proposed for processor verification. A procedure for proving satisfiability of formulas in this logic is introduced...
The binary algorithm is a variant of the Euclidean algorithm that performs well in practice. We present a quasi-linear time recursive algorithm that computes the greatest common di...
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
In recent years, mobile ad-hoc networks (MANET’s) have been deployed in various scenarios, but their scalability is severely restricted by the human operators’ ability to conf...