We present a provably secure tree based authenticated group key agreement protocol in dynamic scenario. Bilinear pairing and multi-signature are at the heart of our protocol. We p...
Abstract. This paper is a review of works about the use of the logpolar image model for pattern recognition purposes. Particular attention is paid to the rotation- and scale-invari...
More than a decade after its invention, Mark Weiser’s vision of ubiquitous computing finally seems to spark many research activities world wide. This article reviews the ideas b...
Abstract. This paper presents an approach that uses the techniques of plan recognition not only to infer short-term plans and goals, but also to infer the long-term procedural know...
The majority of planning and scheduling research has focused on batch-oriented models of planning. This paper discusses the use of iterative repair techniques to support a continu...
Steve A. Chien, Russell Knight, Andre Stechert, Ro...