We describe CSAR, a novel technique for generating cryptographically strong, accountable randomness. Using CSAR, we can generate a pseudo-random sequence and a proof that the elem...
Michael Backes, Peter Druschel, Andreas Haeberlen,...
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Evolutionary Clustering has emerged as an important research topic in recent literature of data mining, and solutions to this problem have found a wide spectrum of applications, p...
Tianbing Xu, Zhongfei (Mark) Zhang, Philip S. Yu, ...
Frame-skipping videos usually appear in wireless video sensor networks which have wirelessly interconnected devices that are able to ubiquitously retrieve video content from the e...
— This paper proposes and experimentally validates a Bayesian network model of a range finder adapted to dynamic environments. The modeling rigorously explains all model assumpt...
Tinne De Laet, Joris De Schutter, Herman Bruyninck...