Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
In this paper, we present BoP, a content-based publish/subscribe system for arbitrary Boolean subscriptions and advertisements. BoP targets at the time and space-efficient matchin...
A network of cooperating agents must be able to reach rough consensus on a set of topics for cooperation. With highly heterogeneous agents, however, incommensurable measures and i...
Research advances in geospatial automated image analysis tools and feature extraction algorithms have matured in recent times to levels of practical applicability. The consolidati...
An interactive system for designing curved surfaces is proposed which is based on direct manipulation of a single-view shaded image of this surface. Apart from functions like carv...