With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
This paper addresses the issue of social recommendation based on collaborative filtering (CF) algorithms. Social recommendation emphasizes utilizing various attributes informatio...
Abstract-- The rapid advances in a wide range of wireless access technologies along with the efficient use of smart spaces have already set the stage for development of smart homes...
Abhishek Roy, Soumya K. Das Bhaumik, Amiya Bhattac...
CST’s Baby CareLink provides a ‘collaborative healthware’ environment for parents of premature infants that incorporates just-in-time learning as one means of knowledge explo...
Howard Goldberg, Alfredo Morales, David MacMillan,...