—Remote ambulatory monitoring is widely seen as playing a key part in addressing the impending crisis in health care provision. We describe two mobile health solutions, one devel...
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
We consider an anytime control algorithm for the situation when the processor resource availability is time-varying. The basic idea is to calculate the components of the control i...
Abstract The LLL algorithm aims at finding a “reduced” basis of a Euclidean lattice. The LLL algorithm plays a primary role in many areas of mathematics and computer science. ...
Automated negotiation has attracted growing interest within fields such as e-business, multi-agent systems, and web services. Nevertheless, a majority of automated negotiation res...