Organizations have long had the need to record and protect the knowledge that is their intellectual capital. However, the primary burden for knowledge management has been borne by...
Beatrix Zimmermann, Michael E. Atwood, Sabina Webb...
When gathering feedback about an envisioned system, prototypes communicate design ideas to user groups. However, it is unclear how user responses are affected by prototype format....
Katherine M. Sellen, Micheal Massimi, Danielle M. ...
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...
Exploiting processor groups is becoming increasingly important for programming next-generation high-end systems composed of tens or hundreds of thousands of processors. This paper...
Jarek Nieplocha, Manojkumar Krishnan, Bruce Palmer...