of modelling abstractions to map from items in the real-world to objects in the computational domain is oth for the effective implementation of abstract problem solutions and for ...
Mariusz Nowostawski, Geoff Bush, Martin K. Purvis,...
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers achieve greater security. Proof of possession of authorisation values known as authdata is require...
Abstract. A fundamental goal of computational complexity (and foundations of cryptography) is to find a polynomial-time samplable distribution (e.g., the uniform distribution) and...
Computer synthesized characters are expected to make appropriate face, limb, and body gestures during communicative acts. We focus on non-facial movements and try to elucidate wha...
Norman I. Badler, Monica Costa, Liwei Zhao, Diane ...
In this paper we address the problem of selfish behavior in ad hoc networks. We propose a strategy driven approach which aims at enforcing cooperation between network participant...
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Kl...