Case-based reasoning in the law is a reasoning strategy in which legal conclusions are supported by decisions made by judges. If the case at hand is analogous to a settled case, th...
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
We present the design of a high performance on-chip pipelined asynchronous DRAM suitable for use in a microprocessor cache. Although traditional DRAM structures suffer from long a...
Health communication researchers have shown that tailored health communication messages outperform nontailored materials. Non-tailored materials are typically “one-size-fits-all...
A self-organized approach to manage a distributed proxy system called Adaptive Distributed Caching (ADC) has been proposed previously. We model each proxy as an autonomous agent th...