In this paper we articulate a new modeling paradigm for both local and global editing on complicated point set surfaces of arbitrary topology. In essence, the proposed technique l...
Many of the documents in large text collections are duplicates and versions of each other. In recent research, we developed new methods for finding such duplicates; however, as the...
As the number of resources on the Grid tends to be very dynamic and potentially large, it becomes increasingly important to discover and monitor them efficiently. This paper conce...
Helene N. Lim Choi Keung, Justin R. D. Dyson, Step...
The ability to automatically compose security policies created by multiple organizations is fundamental to the development of scalable security systems. The diversity of policies ...
Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A...
In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient beca...
Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan v...