We consider a market with two suppliers and a set of buyers in search of procurement contracts with one of the suppliers. In particular, each buyer needs to process a certain volu...
In this paper, we propose a new signature scheme that is existentially unforgeable under a chosen message attack without random oracle. The security of our scheme depends on a new ...
This paper presents a methodology for knowledge acquisition from source code. We use data mining to support semiautomated software maintenance and comprehension and provide practi...
Fusion of sensor and communication data currently can only be performed at a late processing stage after sensor and information are formulated as logical statements at appropriate...
Maturana and Varela's notion of autopoiesis has the potential to transform the conceptual foundation of biology as well as the cognitive, behavioral, and brain sciences. In or...