Forecasting workflow activity durations is of great importance to support satisfactory QoS in workflow systems. Traditionally, a workflow system is often designed to facilitate the...
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...
Abstract. The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns for individuals and businesses alike. T...
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanat...
The probability that a failure will occur before the end of the computation increases as the number of processors used in a high performance computing application increases. For l...
Our goal is to segment multiple interacting and deforming agents in a video. Detectors often fail under large body deformation or agent entanglement. On the other hand, segmenting...