This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
This paper presents a novel software engineering approach for developing a dynamic web interface that meets the quality criterion of “WYDIWYS” - What You Do Is What You See. T...
Jie Dai, Remo Mueller, Jacek Szymanski, Guo-Qiang ...
In urban areas, city noises represent today a great problem. They are real nuisances for city-dwellers. Noises are caused by traffic, road works, factories, and also by people. So...
Background: The architecture of biological networks has been reported to exhibit high level of modularity, and to some extent, topological modules of networks overlap with known f...
Jing Zhao, Guohui Ding, Lin Tao, Hong Yu, Zhong-Ha...
Computational social choice is a new discipline currently emerging at the interface of social choice theory and computer science. It is concerned with the application of computati...