Service-oriented architectures (SOA) will provide the basis of the next generation of distributed software systems, and have already gained enormous traction in the industry throu...
While provenance has been extensively studied in the literature, the efficient evaluation of provenance queries remains an open problem. Traditional query optimization techniques...
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Despite practical successes with the Futamura projections, it has been an open question whether target programs produced by specializing interpreters can always be as efficient as ...
Placement of protection devices in a conventional feeder (without distributed generation) is often performed so as to minimize traditional reliability indices (SAIDI, SAIFI, MAIFI...
Aleksandar Pregelj, Miroslav Begovic, Ajeet Rohatg...