Nanoscale multiple-valued logic systems require the development of nanometer scale integrated circuits and components. Due to limits in device physics, new components must be deve...
We describe a large-scale application of methods for finding plagiarism and self-plagiarism in research document collections. The methods are applied to a collection of 284,834 d...
Daria Sorokina, Johannes Gehrke, Simeon Warner, Pa...
Abstract. The aim of this paper is to investigate the feasibility of predicting the gender of a text document’s author using linguistic evidence. For this purpose, term- and styl...
In a secret sharing scheme based upon access structures, each group has an authorization and only the participants who stayed in an authorized access structure can recover the sec...
This paper motivates the fundamental importance of application context for security. It then gives an overview of the PEI framework for application-centric security and outlines s...