Abstract. The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO '07), who provided the "strongest possible" notion of security for...
This paper presents the design and deployment of Polar Defence, an interactive game for a large public display. We designed this display based on a model of "users" and ...
Matthias Finke, Anthony Tang, Rock Leung, Michael ...
UDDI registries are included as a standard offering within the product suite of any major SOA vendor, serving as the foundation for establishing design-time and run-time SOA govern...
Exploiting the complex structure of relational data enables to build better models by taking into account the additional information provided by the links between objects. We exten...
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...