Location monitoring systems are used to detect human activities and provide monitoring services, e.g., aggregate queries. In this paper, we consider an aggregate location monitori...
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
We introduce a gain-scaling technique for the generalized maximum ow problem. Using this technique, we present three simple and intuitive polynomial-time combinatorialalgorithms fo...
—The wide variety of software development tools available today have a great potential to improve the way developers make software, but that potential goes unfulfilled when deve...
Networks are a shared resource connecting critical IT infrastructure, and the general practice is to always leave them on. Yet, meaningful energy savings can result from improving...