The importance of maintaining provenance has been widely recognized, particularly with respect to highly-manipulated data. However, there are few deployed databases that provide p...
In cryptography, there has been tremendous success in building primitives out of homomorphic semantically-secure encryption schemes, using homomorphic properties in a blackbox way...
Recommendation systems have been studied actively since the 1990s. Generally, recommendation systems choose one or more candidates from a set of candidates through a filtering pro...
We regard the problem of communication in the presence of faulty transmissions. In contrast to the classical works in this area, we assume some structure on the times when the faul...
— The paper presents a novel scheme for target-tracking realized with two mobile robots, where one robot is configured as tracker and the other as moving target. Fuzzy C-means cl...