This paper gives an account of the practical experiences made in generating special statistical information of web server logs. It emphasizes the problem of combining different dat...
Ernst Georg Haffner, Uwe Roth, Andreas Heuer 0002,...
This paper solves the visual cryptography problem by the Blakley scheme that is a geometry-based secret sharing strategy. We first partition the protected image into non-overlappi...
Morphological analysis is a crucial component of several natural language processing tasks, especially for languages with a highly productive morphology, where stipulating a full ...
We develop a methodology for evaluating a decision strategy generated by a stochastic optimization model. The methodology is based on a pilot study in which we estimate the distri...
Robert Rush, John M. Mulvey, John E. Mitchell, Tho...
: Colleges and universities are moving away from the traditional focus on single exchange transactions and toward an emphasis on creating and maintaining longer-term buyer-supplier...