Testing is an essential part of an agile process as test is automated and tends to take the role of specifications in place of documents. However, whenever test cases are faulty, d...
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
The identifying code problem for a given graph involves finding a minimum set of vertices whose neighborhoods uniquely overlap at any given graph vertex. Initially introduced in 1...
Abstract— We consider the problem of minimizing the resources used for network coding while achieving the desired throughput in a multicast scenario. Since this problem is NPhard...
—Patient monitoring via video and physiological data recording can now be performed outside hospitals. This procedure, usually performed in a prolonged manner, generates a consid...
Qiang Liu, Datong Chen, Mingui Sun, Robert J. Scla...