Abstract. Secure multi-party computation has been considered by the cryptographic community for a number of years. Until recently it has been a purely theoretical area, with few im...
Benny Pinkas, Thomas Schneider, Nigel P. Smart, St...
The evaluation of eLearning success is an indispensable business requirement of education programs: the easy registration of `visits' to eLearning websites is, however, not s...
Online social networks are now a popular way for users to connect, express themselves, and share content. Users in today's online social networks often post a profile, consis...
Alan Mislove, Bimal Viswanath, P. Krishna Gummadi,...
Background: Genome-wide association studies have been successful in finding common variants influencing common traits. However, these associations only account for a fraction of t...
Robert Lawrence, Aaron G. Day-Williams, Katherine ...
Simulation and Emulation techniques are fundamental to aid the process of large-scale protocol design and network operations. However, the results from these techniques are often ...
David W. Bauer, Garrett R. Yaun, Christopher D. Ca...