Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Novel approach for statistical inference in survival analysis based on factor or dichotomic variables is proposed. We are seeking for the most informative finitely linear combinat...
Nina Alexeyeva, Ivan Smirnov, Polina Gracheva, Bor...
Numerous research studies have been investigated on proxy signatures over the last decade. This survey reviews the research progress on proxy signatures, analyzes a few notable pr...
We describe results from a survey of employees at Microsoft about how they manage personal and household scheduling. We saw a much greater use of digital calendars than we expecte...
While users disseminate various information in the open and widely distributed environment of the Semantic Web, determination of who shares access to particular information is at ...