We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider ...
Detecting and counting the number of copies of certain subgraphs (also known as network motifs or graphlets), is motivated by applications in a variety of areas ranging from Biolo...
Abstract— To keep pace with recent advances in microrobotic structures demands actuator technologies which can deliver high power and precise motion. For electroactive material b...
The software-assisted planning of radiofrequency-ablation of liver tumors calls for robust and fast methods to segment the tumor and surrounding vascular structures from clinical d...
As peer-to-peer (P2P) networks become more familiar to the database community, intense interest has built up in using their scalability and resilience properties to scale database...