Existing e-commerce applications on the web provide the users a relatively simple, browser-based interface to access available products. Customers are not provided with the same s...
Xiaojun Shen, T. Radakrishnan, Nicolas D. Georgana...
Abstract—This paper describes and compares alternative architectures for achieving the functional goals of name oriented networking. The CCN (content-centric network) scheme prop...
Horizons are visible boundaries between certain sediment layers in seismic data, and a fault is a crack of horizons and it is recognized in seismic data by the discontinuities of ...
In STOC’05, Ahn, Hopper and Langford introduced the notion of covert computation. A covert computation protocol is one in which parties can run a protocol without knowing if oth...
In healthy eukaryotic cells, mitochondria have an outer membrane that surrounds a complex inner membrane structure [7,8]. Cytochrome c is found in the space between the two membra...
John Manor, Peter Salamon, James Nulton, Joseph Ma...