Abstract. The notable developments in pervasive and wireless technology enable us to collect enormous sensor data from each individual. With contextaware technologies, these data c...
Software Process Improvement needs sound empirical data gathered from a range of empirical studies such as controlled experiments or case studies. However, conducting empirical st...
Abstract. We present a unified and complete account of maximum entropy distribution estimation subject to constraints represented by convex potential functions or, alternatively, b...
Pervasive networks with low-cost embedded 8-bit processors are set to change our day-to-day life. Public-key cryptography provides crucial functionality to assure security which is...
Abstract. We present an asymptotically optimal reduction of one-outof-two String Oblivious Transfer to one-out-of-two Bit Oblivious Transfer using Interactive Hashing in conjunctio...