Encrypt-and-sign, where one encrypts and signs a message in parallel, is usually not recommended for confidential message transmission. The reason is that the signature typically l...
Alexander W. Dent, Marc Fischlin, Mark Manulis, Ma...
— In this paper, we present a simple technique to approximate the performance union bound of a punctured turbo code. The bound approximation exploits only those terms of the tran...
Ioannis Chatzigeorgiou, Miguel R. D. Rodrigues, Ia...
Abstract. Location is the most essential presence information for mobile users. In this paper, we present an improved time-based clustering technique for extracting significant lo...
This paper clarifies two common patterns of multitasking on the Web, namely Multiple Tasks (MT) and Multiple Session Task (MST). To support both of these, the task concept needs t...
The success of an executive information system (EIS) depends upon many factors, including providing support for the strategic management process (SMP). The SMP is comprised of fiv...
Sanjay K. Singh, Hugh J. Watson, Richard T. Watson