Today the design of most healthcare technology is driven by the considerations of healthcare professionals and technology companies. This has several benefits, but we argue that t...
Conventional content management systems (CMSes) consider user management, specifically authorization to modify content objects to be orthogonal to any evolution of content within ...
In his celebrated book On Numbers and Games (Academic Press, New-York, 1976), J. H. Conway introduced twelve versions of compound games. We analyze these twelve versions for the N...
The Good is Blondie, a wandering gunman with a strong personal sense of honor. The Bad is Angel Eyes, a sadistic hitman who always hits his mark. The Ugly is Tuco, a Mexican bandi...
In 2008, Wang et. al. first investigate a sort of specific secure multi-party computation--secure convex hull two-party computation, and construct two protocols based on Gift wrap...