PKI is generally considered as the most appropriate solution for e-commerce and mutual authentication, owing to its digital signature and non-repudiation features. Asymmetric key ...
A new evolutionary algorithm, Elitistic Evolution (termed EEv), is proposed in this paper. EEv is an evolutionary method for numerical optimization with adaptive behavior. EEv uses...
Computer games follow a scheme of continuous simulation, coupling the rendering phase and the simulation phase. That way of operation has disadvantages that can be avoided using a...
In many safety-critical applications of embedded systems, the system dynamics exhibits hybrid behaviors. To enable automatic analysis of these embedded systems, many analysis tools...
Abstract. The notable developments in pervasive and wireless technology enable us to collect enormous sensor data from each individual. With contextaware technologies, these data c...