Information systems often require combining datasets available in different formats, and geographical information systems are no exception. While semantic technologies have been u...
Abstract. Active mathematical documents are distinguished from traditional paper-oriented ones by their ability to interactively adapt to a reader’s inputs. This includes changes...
Abstract. Semantic security against chosen-ciphertext attacks (INDCCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is o...
Abstract. Parallel Computational Science and Engineering (CSE) applications often exhibit irregular structure and dynamic load patterns. Many such applications have been developed ...
We present the idea of a flexible phased array of microphones for wearable computers. We show how such an array can be used for both source localization and signal enhancement. A...