We study the edge-connectivity survivable network design problem with an additional linear budget constraint. We give a strongly polynomial time (3, 3)-approximation algorithm for ...
—This paper presents an efficient protocol to reliably exchange information in a single-hop radio network with unpredictable interference. The devices can access C communication...
Seth Gilbert, Rachid Guerraoui, Dariusz R. Kowalsk...
This proposal presents a new error robust strategy for encoding redundant pictures for the H.264/AVC standard. The method is based on providing motion vectors as redundant data, i...
Maheshi B. Dissanayake, Chaminda T. E. R. Hewage, ...
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Health Care Management is one of the most important and most important research areas of the new millennium. The main purpose of this work was to analyze the data on malaria patie...
Dinesh P. Mital, Shankar Srinivasan, Syed Haque, R...