In pervasive computing environments, applications find themselves in constantly changing operating conditions. Such applications often need to discover locally available resources ...
Almost every application of spreading activation is accompanied by its own set of often heuristic restrictions on the dynamics. We show that in constraint-free scenarios spreading...
In this paper, we develop an analytical framework to measure the vulnerability of superpeer networks against attack. Two different kinds of attacks namely deterministic and degre...
Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy ...
Abstract. We describe a consistent splitting approach to the pressurestabilized Petrov-Galerkin finite element method for incompressible flow. The splitting leads to (almost) exp...
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...