Existing techniques for keyword/attribute search in structured P2P overlays suffer from several problems: unbalanced load, hot spots, fault tolerance, storage redundancy, and unab...
With the increasing emphasis on supply chain vulnerabilities, effective mathematical tools for analyzing and understanding appropriate supply chain risk management are now attrac...
A multiple-camera system for 3D pose reconstruction is presented. First, body parts of the user are detected. Each camera has a single-instruction multiple-data (SIMD) processor u...
In a wireless communication network different users share a common resource. An objective of radio resource management is to assign the resources in an effective way between the us...
Abstract. We analyze special random network models – so-called thickened trees – which are constructed by random trees where the nodes are replaced by local clusters. These obj...
Michael Drmota, Bernhard Gittenberger, Reinhard Ku...