While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
- To a large extent, governments and organizations worldwide have recognized that either the broader information communication technologies (ICTs) sector or specifically with respe...
Yun Tang, Lifeng Sun, Hai Qin, Shiqiang Yang, Yuzh...
This work focuses on one of the most critical issues to plague the wireless telecommunications industry today: the loss of a valuable subscriber to a competitor, also defined as ch...
Jorge Ferreira, Marley B. R. Vellasco, Marco Aur&e...
—In this paper a method for the objective assessment of burn scars is proposed. The quantitative measures developed in this research provide an objective way to calculate elastic...
Leonid V. Tsap, Dmitry B. Goldgof, Sudeep Sarkar, ...
The World Wide Web is a potentially valuable source of information about the cognitive characteristics of cultural groups. However, attempts to use the Web in the context of cultur...
Paul R. Smart, Winston R. Sieck, Nigel R. Shadbolt