The design of ad hoc mobile applications often requires the availability of a consistent view of the application state among the participating hosts. Such views are important beca...
This paper suggests a new building block for cryptographic protocols and gives two instantiations of it. The concept is to generate two descriptions of the same group: a public des...
Participatory research methods are being used internationally to gather data on complex social, cultural, and political concerns that effect the use of technology [4]. Researchers...
We consider a system of linear constraints over any finite Abelian group G of the following form: i(x1, . . . , xn) ≡ i,1x1 + · · · + i,nxn ∈ Ai for i = 1, . . . , t and e...
The classical group testing problem asks to determine at most d defective elements in a set of n elements, by queries to subsets that return Yes if the subset contains some defecti...