Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
We present a framework for hypothesis testing of differences between groups of DTI fiber tracts. An anatomical, tract-oriented coordinate system provides a basis for estimating the...
Casey Goodlett, P. Thomas Fletcher, John H. Gilm...
This paper proposes a new type of database for collaborative work. Known types of databases for collaborative work are databases of shared data and those of process data. A new typ...
Code Cloning is regarded as a threat to software maintenance, because it is generally assumed that a change to a code clone usually has to be applied to the other clones of the cl...
The simulation of group-work interaction is significant for Chinese enterprise organizational management. As a result, a cellular-automata based simulation model is put forward. T...