Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplif...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
Abstract--The Internet provides a universal platform for largescale distribution of information and supports inter-organizational services, system integration, and collaboration. U...
James B. D. Joshi, Zhaohui Kevin Li, Husni Fahmi, ...
In recent models of decision-making, cognitive scientists have examined the relationship between option generation and successful performance. These models suggest that those who a...
Paul Ward, Joel Suss, David W. Eccles, A. Mark Wil...
Techniques to reduce power dissipation for embedded systems have recently come into sharp focus in the technology development. Among these techniques, dynamic voltage scaling (DVS)...