— We consider shared resource pool management taking into account per-application quality of service (QoS) requirements and server failures. Application QoS requirements are deï¬...
To integrate a software component into a system, it must interact properly with the system's other components. Unfortunately,the decisions about how a component is to interac...
Current constructions of efficient argument systems combine a short (polynomial size) PCP with a cryptographic hashing technique. We suggest an alternative approach for this probl...
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Effect axioms constitute the cornerstone of formal theories of action in AI. They drive standard reasoning tasks, especially prediction. These tasks need not be coupled with actual...