Identity-based cryptography uses pairing functions,which are sophisticated bilinear maps defined on elliptic curves.Computing pairings efficiently in software is presently a relev...
Guido Marco Bertoni, Luca Breveglieri, Pasqualina ...
All programmers should understand the concept of program families and know the techniques for constructing them. This paper describes a case study that can be used to introduce st...
Abstract. We propose a brain-computer interface (BCI) system for evolving images in realtime based on subject feedback derived from electroencephalography (EEG). The goal of this s...
The main goal of a Case-Based Reasoning (CBR) system is to provide criteria for evaluating the internal behavior and task efficiency of a particular system for a given initial case...
In this paper we present a flow control algorithm designed to improve the performance of ATM network and to gain higher throughput by guaranteeing negotiated cell loss ratio (CLR)...