Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
— In this paper we describe a knowledge-based approach that enables the subjective evaluation of portal and e-service quality by users in an adaptive manner. The model for adapti...
Distributed programming is applicable in a wide range of domains such as control systems. These systems are subject to mutable environments and must also provide a time varying ad...
Luci Pirmez, Luiz F. Rust da Costa Carmo, Reinaldo...
Moving-objects databases need a spatio-temporal indexing scheme for moving objects to efficiently process queries over continuously changing locations of the objects. A simple exte...
Software frequently needs to adapt its behavior at run time to respond to changes in its execution environment. Different software components may use different approaches to adap...
Zhenxiao Yang, Zhinan Zhou, Betty H. C. Cheng, Phi...
A self-stabilizing distributed protocol can recover from any state-corrupting fault. A self-stabilizing protocol is called adaptive if its recovery time is proportional to the numb...
Developing adaptive, rich-media, eLearning courses tends to be a complex, highly-expensive and time-consuming task. A typical adaptive eLearning course will involve a multi-skilled...
Engineering adaptive Web applications implies the development of content that can be automatically adjusted to varying client devices and user preferences. To meet this requiremen...
In efforts to attract a wider audience, videogames are beginning to incorporate adaptive gameplay mechanics. Unlike the more traditional videogame, adaptive games can cater the ga...
We study the question whether the sequential or parallel composition of two functions, each indistinguishable from a random function by non-adaptive distinguishers is secure agains...