The purpose of this paper is to report on experiments in (human) multi-issue negotiation and their analysis, and to present a generic software environment supporting such an analy...
Abstract. Current peer-to-peer architectures are hardly resistant against unanticipated exceptions such as the failure of single peers. This can be justified by the absence of soph...
Abstract. Exponentiation is a central process in many public-key cryptosystems such as RSA and DH. This paper introduces the concept of self-randomized exponentiation as an efficie...
It is possible to model avatars that learn to simulate object manipulations and other complex actions. A number of applications may benefit from this technique including safety, e...
Thermal medical imaging provides a valuable method for detecting various diseases such as breast cancer or Raynaud’s syndrome. While previous efforts on the automated processing...