Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
The push toward business process automation has generated the need for integrating different enterprise applications involved in such processes. The typical approach to integration...
Peer-to-peer (P2P) computing grids consist of peer nodes that communicate directly among themselves through wide-area networks and can act as both clients and servers. These syste...
In this paper, we present PelletSpatial, a qualitative spatial reasoning engine implemented on top of Pellet. PelletSpatial provides consistency checking and query answering over s...
Reasoning about events or temporal aspects is fundamental for modeling geographic phenomena. This work concerns the analysis of events as configurations of temporal intervals. It...