This paper is concerned with the problem of computing the image of a set by a polynomial function. Such image computations constitute a crucial component in typical tools for set-b...
— It has been observed that a bottleneck Random Early Detection (RED) gateway becomes oscillatory when regulating a flow in multiple TCP connections. The stability boundary of t...
Xi Chen, Siu Chung Wong, Chi K. Michael Tse, Ljilj...
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have ...
Recent years have seen the development of many graph clustering algorithms, which can identify community structure in networks. The vast majority of these only find disjoint commun...
We study the pattern statistics representing the number of occurrences of a given string in a word of length n generated at random by rational stochastic models, defined by means ...