Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Effective human teams often benefit from proactivity through members’ capability of anticipating different needs of teammates. In this paper, we focus on three issues related...
John Yen, Xiaocong Fan, Shuang Sun, Rui Wang, Cong...
In this paper, we address the tasks of recognition and interpretation of affect communicated through text messaging. The evolving nature of language in online conversations is a ma...
Alena Neviarouskaya, Helmut Prendinger, Mitsuru Is...
: We investigate the parallel scaling of the GROMACS molecular dynamics code on Ethernet Beowulf clusters and what prerequisites are necessary for decent scaling even on such clust...
Carsten Kutzner, David van der Spoel, Martin Fechn...
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...