We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ļ¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
We extend the differential approach to inference in Bayesian networks (BNs) (Darwiche, 2000) to handle speciļ¬c problems that arise in the context of dynamic Bayesian networks (D...
Ubiquitous access to sophisticated internet services from diverse end devices across heterogeneous networks requires the injection of additional functionality into the network to ...
Multicast network services advantageously complement multimedia information and communication technologies, as they open up the realm for highly scalable multicustomer application...
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...