Peyravian and Zunic (2000) proposed a password transmission scheme and a password change scheme over an insecure network. Their proposed solutions do not require the use of any sym...
Attempts to solve the famous Four Color Problem led to fruitful discoveries and rich coloring theories. In this talk, some old and some recent applications of tools from topology ...
The success of exploration-based training is likely to be strongly influenced by what activities the learner undertakes during training. This paper presents a study of the activiti...
Logistics is a dynamic and heterogeneous application area for wearable computing. In this paper, wearable computing technologies are examined as basis for a support system for mobi...
Background: Clustering the information content of large high-dimensional gene expression datasets has widespread application in "omics" biology. Unfortunately, the under...