We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
This paper presents an efficient technique for placement and routing of sensors/actuators and processing units in a grid network. Our system requires an extremely high level of ro...
In this paper, we describe a new approach for mining concept associations from large text collections. The concepts are short sequences of words that occur frequently together acr...
A voting protocol for decision-making in virtual organizations is presented. In an agent-based virtual organization the functions of formation, management and dissolution of the o...
Jeremy V. Pitt, Lloyd Kamara, Marek J. Sergot, Ale...
Several relational approaches have been proposed to detect the changes to XML documents by using relational databases. These approaches store the XML documents in the relational d...