Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Current developments in processing data streams are based on the best-effort principle and therefore not adequate for many application areas. When sensor data is gathered by inte...
This paper presents a novel algorithm for identification and functional characterization of “key” genome features responsible for a particular biochemical process of interest....
Gong-Xin Yu, George Ostrouchov, Al Geist, Nagiza F...
We present a noiseless source coding problem in a broadcast environment and supply a simple solution to this problem. A transmitter wishes to transmit a binary random vector Ò ½...
Most applications developed today rely on a given middleware platform which governs the interaction between components, the access to resources, etc. To decide, which platform is ...