Abstract. Identity-based encryption (IBE) schemes are usually used in multiplePKG environments — on the one hand, each administrative domain (e.g., a relatively small and close o...
: Business processes provide abstractions for modelling business protocols that define the correct interactions between two or more Web services (WS). It has been shown that it is ...
Abstract. In this paper we present a model-based approach for the development of physical hypermedia applications, i.e. those mobile (Web) applications in which physical and digita...
Cecilia Challiol, Gustavo Rossi, Silvia E. Gordill...
Abstract. The aim of the given paper is the development of an approach for parametric identification of Hammerstein systems with piecewise linear nonlinearities, i.e., when the sat...
Abstract. Peer-to-peer (P2P) networks integrate autonomous computing resources without requiring a central coordinating authority, which makes them a potentially robust and scalabl...