The Internet is widely valued for distributing control over information to a lateral network of individuals, but it is not clear how these networks can most effectively organize t...
Cristen Torrey, Moira Burke, Matthew L. Lee, Anind...
Deficiencies in the ability to map letters to sounds are currently considered to be the most likely early signs of dyslexia [4]. This has motivated the use of Literate, a compute...
Mikko Vilenius, Janne V. Kujala, Ulla Richardson, ...
Frequent itemsets mining is a popular framework for pattern discovery. In this framework, given a database of customer transactions, the task is to unearth all patterns in the for...
Srivatsan Laxman, Prasad Naldurg, Raja Sripada, Ra...
We study the complexity of combinatorial problems that consist of competing infeasibility and optimization components. In particular, we investigate the complexity of the connectio...
Jon Conrad, Carla P. Gomes, Willem Jan van Hoeve, ...
Key establishment between two parties that uses only one message transmission is referred to as one-pass key establishment (OPKE). OPKE provides the opportunity for very efficient ...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...