The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
Rocchio’s similarity-based relevance feedback algorithm, one of the most important query reformation methods in information retrieval, is essentially an adaptive supervised lear...
RPG’s (Role Playing Games) and improvisational theatre have some obvious similarities. Both require the participants to work together in real-time to construct dynamic narrative...
Current network management architectures are using different models to define management information objects. These definitions actually also include, in a non-formal way, the defi...
Communication subsystems are used in high-performance parallel computing systems to abstract the lower network layer. By using a communication subsystem, an upper middleware librar...