Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Because XML documents tend to be very large and are more and more collaboratively processed, their fine-grained storage and management is a must for which, in turn, a flexible tree...
■ Knowledge about cause and effect relationships (e.g., virus– epidemic) is essential for predicting changes in the environment and for anticipating the consequences of events...
Daniela B. Fenker, Mircea Ariel Schoenfeld, Michae...
■ Decision-making about affective value may occur after the reward value of a stimulus is represented and may involve different brain areas to those involved in decision-making ...
Edmund T. Rolls, Fabian Grabenhorst, Benjamin A. P...