Abstract In this paper, we describe a novel approach to intrinsic plagiarism detection. Each suspicious document is divided into a series of consecutive, potentially overlapping ā...
In this paper, we present two fully secure functional encryption schemes. Our ļ¬rst result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...
Current trends in model construction in the ļ¬eld of agentbased computational economics base behavior of agents on either game theoretic procedures (e.g. belief learning, ļ¬ctit...
ā Application of Discrete Multi-tone (DMT) signaling to high-speed backplane interconnects requires major modifications to the well-known analysis methods applied to wireline com...
Amir Amirkhany, Ali-Azam Abbasfar, Vladimir Stojan...
In formal veriļ¬cation, we verify that a system is correct with respect to a speciļ¬cation. When veriļ¬cation succeeds and the system is proven to be correct, there is still a q...
Hana Chockler, Orna Kupferman, Robert P. Kurshan, ...