Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Since humans usually prefer to communicate in qualitative and not in quantitative categories, qualitative spatial representations are of great importance interfaces of systems that...
Alexandra Musto, Klaus Stein, Andreas Eisenkolb, T...
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
: Implementing systems for emergency response poses various challenges. Information from various sources and systems needs to be integrated, processed, aggregated, and visualized i...