While online service providers are sometimes accused of forwarding identifying customer information as name and address to untrusted third parties, comparatively little attention ...
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
Pervasive information systems give an overview of what digital environments should look like in the future. From a data-centric point of view, traditional databases have to be used...
While the study of terrorism has expanded dramatically since the 1970s, most analyses are limited to qualitative case studies or quantitative analyses of international incidents on...
The Grid-based Virtual Laboratory AMsterdam (VLAM-G), provides a science portal for distributed analysis in applied scientific research. It offers scientists experiment control, d...
Hamideh Afsarmanesh, Robert G. Belleman, Adam Bell...