Program transformation techniques have reached a maturity level that allows processing high-level language sources in new ways. Not only do they revolutionize the implementation o...
Abstract: This paper surveys the practical benefits and drawbacks of several identitybased encryption schemes based on bilinear pairings. After providing some background on identit...
senting them at different levels of abstraction. This can make the analysis complex and unwieldy, requiring teams of analysts to manage it. A new approach to managing the complexit...
Synchronous groupware depends on the assumption that people are fully connected to the others in the group, but there are many situations (network delay, network outage, or explic...
Carl Gutwin, T. C. Nicholas Graham, Christopher Wo...