Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
We propose a strategy to decompose a polygon, containing zero or more holes, into “approximately convex” pieces. For many applications, the approximately convex components of ...
In this paper we present our vision of the Internet Enterprise: a highly interoperable, virtual enterprise infrastructure for individuals, small businesses, and large corporations...
Abdelsalam Helal, Stanley Y. W. Su, Jie Meng, Raja...
Discrete-event simulation is an established tool for the design and management of large-scale mail sortation and distribution systems. Because the design of distribution facilitie...
K. Preston White, Brian Barney, Scott Keller, Robe...
We address the difficult open problem of emulating the rich complexity of real pedestrians in urban environments. Our artificial life approach integrates motor, perceptual, beha...