Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method f...
Kim-Phuong L. Vu, Robert W. Proctor, Abhilasha Bha...
Power consumption is an important issue for cluster supercomputers as it directly affects running cost and cooling requirements. This paper investigates the memory energy efficienc...
Abstract— The TISPAN group from ETSI is currently working on the specification a Next Generation Network (NGN), based on the IP Multimedia Subsystem (IMS) as the service control...
A random access protocol named ALLIANCES was recently proposed, that achieves high throughput by resolving collisions in wireless networks. ALLIANCES exploits diversity provided b...
We survey results on transitive-closure spanners and their applications. Given a directed graph G = (V, E) and an integer k 1, a k-transitive-closure-spanner (k-TC-spanner) of G ...