In this paper, we consider an optical network consisting of N nodes arranged in tandem. We assume traffic grooming, which permits multiple sub-rate tr...
The MQV key agreement protocol has been included in recent standards (IEEE and ANSI), but its two-pass form is vulnerable to an unknown key-share atta...
We present a simple and ef .cient algorithm for decomposing a planar polygon with holes into trapezoids. We show that our trapezoidation algorithm ta...
A computer model ofwave refraction is desirable, in the context oflandscape modeling, to generate the familiar wave patterns seen near coastlines. In...
The .eld of computer graphics is expanding and evolving rapidly. Past computer graphics courses addressed low- level topics such as line drawing algo...