We deal with the problem of a center sending a message to a group of users such that some subset of the users is considered revoked and should not be able to obtain the content of...
Abstract. One way to protect a digital product is to embed an author's signature into the object in the form of minute errors. However, this technique cannot be directly appli...
Abstract. Distributedobject middleware, suchas CORBA, hides systemand network-speci c characteristics of objects behind functional interface speci cations. This simpli es developme...
Joseph P. Loyall, David E. Bakken, Richard E. Scha...
The aggregated structure of documents plays a key role in full-text, multimedia, and network Information Retrieval (IR). Considering aggregation provides new querying facilities a...
Abstract. In this paper we study a new approach to classify mathematical theorems according to their computational content. Basically, we are asking the question which theorems can...