Abstract—We study a problem of broadcasting confidential messages to multiple receivers under an information-theoretic secrecy constraint. Two scenarios are considered: 1) all r...
Ashish Khisti, Aslan Tchamkerten, Gregory W. Worne...
— We explore the price dynamics in a competitive market consisting of spectrum agile network service providers and users. Here, multiple self interested spectrum providers operat...
Yiping Xing, Rajarathnam Chandramouli, Carlos de M...
In this paper, a programming model is presented which enables scalable parallel performance on multi-core shared memory architectures. The model has been developed for application...
Motivation: Genetic analysis of HIV-1 is important not only for vaccine development, but also to guide treatment strategies, track the emergence of new viral variants and ensure t...
Tulio de Oliveira, Koen Deforche, Sharon Cassol, M...
Entity matching (a.k.a. record linkage) plays a crucial role in integrating multiple data sources, and numerous matching solutions have been developed. However, the solutions have...
Warren Shen, Pedro DeRose, Long Vu, AnHai Doan, Ra...