Clustering or co-clustering techniques have been proved useful in many application domains. A weakness of these techniques remains the poor support for grouping characterization. ...
Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Social Tagging Systems (STS) empower users to classify and organize resources and to improve the retrieval performance over the tagged resources. In this paper we argue that the po...
Abstract. The design of architectural environments has to take into account various sources of heterogeneous information. Not only quantitative spatial constraints and qualitative ...