Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
In today’s global economy organizations are increasingly resorting to culturally diverse groups of individuals to cope with the challenges of a global market. Often, group decis...
Imad Samarah, Souren Paul, Peter Mykytyn, Priya Se...
This paper shows how computational Riemannian manifold can be used to solve several problems in computer vision and graphics. Indeed, Voronoi segmentations and Delaunay graphs comp...
Background: Gene Ontology (GO) terms are often used to assess the results of microarray experiments. The most common way to do this is to perform Fisher's exact tests to find...
This paper studies the cycle indices of products of permutation groups. The main focus is on the product action of the direct product of permutation groups. The number of orbits o...
Peter J. Cameron, Daniele A. Gewurz, Francesca Mer...