Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Many scholars believe that electronic rulemaking has great but largely untapped potential to expand the public's democratic input and improve federal agency regulatory rules....
Peter Muhlberger, Nick Webb, Jennifer Stromer-Gall...
From the 1990s on, one of the most important challenges facing computer science researchers has been the design and construction of software tools to exploit Internet computing. A...
that graph transformations provide the right level of abstraction, and useful technical tools for studying gene assembly. On the other hand, the gene assembly process inspires a ne...
This paper asks the question: how might CSCW system design obtain and be informed by an adequate real-world, real-time understanding of work and organisation on any occasion of wor...