Bitmapping is an art exhibition that seeks to create a linear story path through a collection of photographs. Bitmapping sends registered participants an image to their mobile pho...
We present in this paper a hybrid planning system which combines constraint satisfaction techniques and planning heuristics to produce optimal sequential plans. It integrates its ...
Network devices can filter traffic in order to protect end-user computers against network worms and other threats. Since these devices have very limited memories and cannot deploy ...
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Understanding consumer behavior is of vital importance to consumer oriented e-business models today. In this paper we report on a study into the relationships between consumer per...