Traitor Tracing Schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, each decryption key is...
Turn-taking behavior is simulated in a coupled-agents system. Each agent is modeled as a mobile robot with two wheels. A recurrent neural network is used to produce the motor outpu...
Abstract. Reconciling personalization with privacy has been a continuing interest in the user modeling community. In prior work, we proposed a dynamic privacy-enhancing user modeli...
: Social-aware computing is an emerging trend based on ubiquitous computing technologies and collaborative work. A successful design demands a better understanding of group tasks, ...
Web spider is a widely used approach to obtain information for search engines. As the size of the Web grows, it becomes a natural choice to parallelize the spider’s crawling proc...