Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
In recent years, adaptation techniques have been given special focus in speaker recognition tasks, mainly targeting speaker and session variation disentangling under the Maximum a...
This paper presents a fuzzy logic approach for switching multiple reference models, within the Model Reference Adaptive Control (MRAC) framework, in response to major changes in t...
Sukumar Kamalasadan, Adel A. Ghandakly, Khalid S. ...
One of the main tasks of workflow management systems is the coordination of activities in business processes. This paper introduces a solution framework to support adaptive workfl...
Dynamic adaptation may be used to prevent software downtime while new requirements and responses to environmental conditions are incorporated into the system. Previously, we studi...