As the desire for business intelligence capabilities for e-business processes expands, existing workflow management systems and decision support systems are not able to provide co...
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven bas...
Runtime quality of software, such as availability and throughput, depends on architectural factors and execution environment characteristics (e.g. CPU speed, network latency). Alth...
Information Technology has become a core activity in most, if not all, corporations. Although IT managers continue to be under-represented in executive management, the very centra...
The design of sensor networks capable of reaching a consensus on a globally optimal decision test, without the need for a fusion center, is a problem that has received considerable...