Software components turn out to be a convenient model to build complex applications for scientific computing and to run them on a computational grid. However, deploying complex, co...
As artificial intelligence (AI) systems and behavior models in military simulations become increasingly complex, it has been difficult for users to understand the activities of co...
Mark G. Core, H. Chad Lane, Michael van Lent, Dave...
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
In technical chemistry, systems biology and biotechnology, the construction of predictive models has become an essential step in process design and product optimization. Accurate ...
Internet is widely known for lacking any kind of mechanism for the provisioning of Quality of Service (QoS) guarantees. The Internet community currently concentrates its efforts on...
Charilaos A. Tsetsekas, Sotirios Maniatis, Iakovos...