This paper addresses challenges to resource managers' use of scientific research, and reports strategies and informatics tools to ameliorate those challenges. Our work involv...
Natalie Kopytko, Judith Bayard Cushing, Lee Zeman,...
We address the problem of standardising the semantics of agent communication. The diversity of existing approaches suggests that no single agent communication language can satisfa...
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
This paper describes the evaluation of a Scrutable User Modelling Infrastructure. SUMI is intended to form a service to allow users to share their user models from social e-network...
Demetris Kyriacou, Hugh C. Davis, Thanassis Tiropa...