Conventional methods used for the interpretation of activation data provided by functional neuroimaging techniques provide useful insights on what the networks of cerebral structu...
Providing a fully functional multimedia DBMS (MMDBMS) becomes an emergency with the recent development of distributed environments. In this paper, we address the impact of using w...
—We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicabl...
Currently available application frameworks that target the automatic design of real-time embedded software are poor in integrating functional and non-functional requirements for m...
A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are stil...