In this paper, we present an online/offline identity-based signature scheme for the wireless sensor network (WSN). We argue that due to significant reduction in costs of computati...
Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanji...
Functional reactive programming (FRP) is an elegant and successful approach to programming reactive systems declaratively. The high levels of abstraction and expressivity that mak...
Neelakantan R. Krishnaswami, Nick Benton, Jan Hoff...
Process mining techniques use event data to discover process models, to check the conformance of predefined process models, and to extend such models with information about bottl...
Wil M. P. van der Aalst, Arya Adriansyah, Boudewij...
Fault links represent relationships between the types of mistakes made and the type of module being developed or modified. The existence of such fault links can be used to guide co...
Jane Huffman Hayes, Inies C. M. Raphael, Vinod Kum...
In this paper we propose semantic web-based mobile knowledge searching systems for display Web pages on mobile terminals. The proposed system reduces the time of verification when ...