In an anonymous network processors have no distinct identifiers. For any class of anonymous networks, we characterize effectively the vector functions f : n → n which are compu...
Metal and beam-hardening artifacts are tough issues in Computed Tomography (CT) images. This paper proposes an iterative Maximum A Posteriori (MAP) reconstruction algorithm aiming...
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
A simple programmable Java platform-independent distributed computation system has been developed to exploit the free resources on computers linked together by a network. It is a ...
Andrew J. Page, Thomas M. Keane, Richard Allen, Th...
In this paper a new and powerful computer simulation capability for the characterization of carbonaceous nanoparticle assemblies across multiple, connected scales, starting from th...