Mass causality incidents generate a sequence of response events from the emergency services, requiring the allocation and use of resources in a timely fashion. In this paper we de...
Marcus Lucas da Silva, Vassilis Kostakos, Mitsuji ...
The use of one-way chains in authentication protocols is a technique of great importance which has many applications. Employing cryptographic techniques in the area of industrial ...
Abstract- Sequential parameter optimization is a heuristic that combines classical and modern statistical techniques to improve the performance of search algorithms. To demonstrate...
Thomas Bartz-Beielstein, Christian Lasarczyk, Mike...
A wearable situational awareness terminal (WearSAT) that provides text, graphics, and video to an astronaut via a near-eye display, and acts as a client on a wireless network, has...
Christopher E. Carr, Steven J. Schwartz, Ilia Rose...
: In this paper, we present an approach to refine user profiles that were derived from Web server logs in an automated procedure. In most application scenarios, such automatically ...