In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have ...
This paper addresses the problem of scheduling realtime dwells in multi-function phase array radar systems. To keep track of targets, a radar system must meet its timing and energ...
This paper presents a novel computational approach to the study of creativity. In particular, it discusses a modeling framework that addresses the worth of ideas ascribed by agent...
Software organizations follow capability models in order to aggregate quality to their processes and products. Process measurement and analysis are key issues, but their implement...
Duncan Dubugras A. Ruiz, Karin Becker, Taisa C. No...
With the proliferation of XML as the lingua franca of internet information exchange, engineering XML documents and maintaining their databases becomes a major challenge. In this c...