Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Policy-based networks can be customized by users by injecting programs called policies into the network nodes. So if general-purpose functions can be specified in a policy-based ne...
Research show that teacher's nonverbal immediacy can have a positive impact on student's cognitive learning and affect [31]. This paper investigates the effectiveness of ...
This paper describes an experiment which aims to examine the effectiveness and efficiency of a Virtual Reality Modelling Language (VRML) building model compared with equivalent ar...
In this paper, we study the privacy-preserving decision tree building problem on vertically partitioned data. We made two contributions. First, we propose a novel hybrid approach, ...