Computer-Science
Securite des syst`emes critiques et cybercriminalite : vers une securite globale ?
Evaluation Study for Delay and Link Utilization with the New-Additive Increase Multiplicative Decrease Congestion Avoidance and Control Algorithm
Grammatical Aspects for Language Descriptions
Modeling Web Evolution
On Touching Triangle Graphs
Parallel computation of real solving bivariate polynomial systems by zero-matching method
The long-term dynamics of co-authorship scientific networks, Iberoamerican Countries (1973-2006)
A Steganography Based on CT-CDMA Communication Scheme Using Complete Complementary Codes
Analytical shape determination of fiber-like objects with Virtual Image Correlation
Multiple Access Network Information-flow And Correction codes
On the Design and Implementation of Structured P2P VPNs
On the Model Transform in Stochastic Network Calculus
Universally Optimal Privacy Mechanisms for Minimax Agents
Virtual Private Overlays: Secure Group Commounication in NAT-Constrained Environments
Multi-Armed Bandit Mechanisms for Multi-Slot Sponsored Search Auctions
A Distributed Data Storage Scheme for Sensor Networks
Harvesting Collective Intelligence: Temporal Behavior in Yahoo Answers
Sequential Posted Pricing and Multi-parameter Mechanism Design
An Extension for Combination of Duty Constraints in Role-Based Access Control
An Improved Approach to High Level Privacy Preserving Itemset Mining
Application of a Fuzzy Programming Technique to Production Planning in the Textile Industry
Building reputation systems for better ranking