In the context of ambient networks, this article describes a cryptographic protocol called Common History Extraction (CHE) protocol implementing a trust management framework. All t...
Samuel Galice, Marine Minier, John Mullins, St&eac...
Abstract. This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary perm...
Abstract. We address cross-organizational workflows, such as document workflows, which consist of multiple workflow modules each of which can interact with others by sending and re...
We propose solutions for seamlessly integrating synthetic objects into background photographs at interactive rates. Recently developed image-based methods are used to capture real...
Interactions between synaptic vesicles and synapsin in a presynaptic nerve terminal were modeled using the CellDEVS formalism. Vesicles and synapsins move randomly within the pres...
Rhys Goldstein, Gabriel A. Wainer, James J. Cheeth...