Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Data access applications in Mobile Ad Hoc Networks (MANETs) suffer from intermittent network connections and restricted power supplies. While most of the researches focus on Media...
This paper addresses the repeated acquisition of labels for data items when the labeling is imperfect. We examine the improvement (or lack thereof) in data quality via repeated la...
Victor S. Sheng, Foster J. Provost, Panagiotis G. ...
Recently many data types arising from data mining and Web search applications can be modeled as bipartite graphs. Examples include queries and URLs in query logs, and authors and ...
There are many bioinformatics tools that deal with input/ output (I/O) issues by using filing systems from the most common operating systems, such as Linux or MS Windows. However, ...