Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
The control dependence relation is used extensively in restructuring compilers. This relation is usually represented using the control dependence graph; unfortunately, the size of...
In September 2009, the Indian Remote Sensing OCEANSAT-2 satellite was launched from Sriharikota (India). Moreover, OCEANSAT-2 carry on-board a third payload, called ROSA (Radio Oc...
Lorenzo Mossucca, Olivier Terzo, Maurizio Molinaro...
The authors report on findings on computer technology needs and concerns of 725 Canadian college and university students with a wide range of disabilities. The vast majority of thi...
Jennison V. Asuncion, Catherine S. Fichten, Myrtis...
Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, wh...