Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
The following problem was introduced by Marcin Krzywkowski as a generalization of a problem of Todd Ebert. After initially coordinating a strategy, n players each occupy a differe...
Information collection in the disaster area is an important application of pigeon networks - a special type of delay tolerant networks (DTN) that borrows the ancient idea of using ...
In this paper we show how we can compute in a deterministic way the decomposition of a multivariate rational function with a recombination strategy. The key point of our recombinat...
: In the post-crisis era new concepts are emerging, while some old and dysfunctional ones are being discarded. Strategy is about making series of decisions that drive corporate act...
We propose a novel strategy, based on resampling of 3D meshes, to recognize facial expressions. This entails conversion of the existing irregular 3D mesh structure in the database ...
Y. V. Venkatesh, Ashraf A. Kassim, O. V. Ramana Mu...
We introduce a novel multi-agent patrolling strategy. By assumption, the swarm of agents performing the task consists of very low capability ant-like agents. The agents have littl...
Abstract: This paper proposes a strategy to manage the schedulability of realtime component-based applications that is fully compatible with the concept of component viewed as a re...
—In this paper, we analyze the achievable capacity of the secondary service for overlay and underlay access strategies. We then propose a novel mixed access strategy in which in ...
Mohammad G. Khoshkholgh, Keivan Navaie, Halim Yani...
Many programs exploit shared-memory parallelism using multithreading. Threaded codes typically use locks to coordinate access to shared data. In many cases, contention for locks r...
Nathan R. Tallent, John M. Mellor-Crummey, Allan P...