SASC (Server-Aided Secret Computation) protocols enable a client (a smart card) to borrow computing power from a server (e.g., an untrustworthy auxiliary device like an ATM) witho...
Heeyoul Kim, Younho Lee, Seong-Min Hong, Hyunsoo Y...
The objective of this paper is to emphasize a clear and natural distinction in strategies of sensor network design. In order to display different architectural paradigms in today...
The paper analyses the problem of ranking accuracy in multiple criteria decision-making (MCDM) methods. The methodology for measuring the accuracy of determining the relative signi...
Edmundas Kazimieras Zavadskas, Algimantas Zakarevi...
Interaction testing is widely used in screening for faults. In software testing, it provides a natural mechanism for testing systems to be deployed on a variety of hardware and so...
Structured document retrieval makes use of document components as the basis of the retrieval process, rather than complete documents. The inherent relationships between these comp...
Jane Reid, Mounia Lalmas, Karen Finesilver, Morten...