Abstract. We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterio...
Abstract. Classical network flow theory allows decomposition of flow into several chunks of arbitrary sizes traveling through the network on different paths. In the first part ...
We summarize the Computational Engineering and Science program at the University of Utah. Program requirements as well as related research areas are outlined. To obtain the MS degr...
Carleton DeTar, Aaron L. Fogelson, Christopher R. ...
Service-oriented computing is meant to support loose relationships between organisations: Collaboration procedures on the application-level translate to interaction processes via ...
Christian Zirpins, Winfried Lamersdorf, Toby Baier
The aim of this paper is to study the feasibility of using (irreversible) entropy production as driving force for a moving mesh. Such a method should be able to capture or track p...