Now showing items 1-5 of 5
On Isolating Points Using Unit Disks
(Journal of Computational Geometry;Vol. 7 No. 1, 2016)
Given a set of points in the plane and a set of disks (that we think of as wireless sensors) which separate the points, we consider the problem of selecting a minimum subset of the disks such that any path between any pair ...
An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach
The area of smart homes is one of the most popular for deploying smart connected devices. One of the most vulnerable aspects of smart homes is access control. Recent advances in IoT have led to several access control models ...
On Clustering to Minimize the Sum of Radii
(SIAM Journal on Computing;41(1), 2012-01-05)
Let P be a set of n points in the plane. Consider the problem of finding k disks, each centered at a point in P, whose union covers P with the objective of minimizing the sum of the radii of the disks. We present an exact ...
On the Detection of Low-Rate Denial of Service Attacks at Transport and Application Layers
Distributed denial of service (DDoS) attacks aim to deplete the network bandwidth and computing resources of targeted victims. Low-rate DDoS attacks exploit protocol features such as the transmission control protocol (TCP) ...
Guarding Terrains Via Local Search
(Journal of Computational Geometry;Vol. 5 No. 1, 2014-05-30)
We obtain a polynomial time approximation scheme for the terrain guarding problem improving upon several recent constant factor approximations. Our algorithm is a local search algorithm inspired by the recent results of ...