The limitation of network resource reduces the awareness capability of CVE system, which becomes the main bottleneck for applications in Internet. In this paper, we study the relat...
One-way hash functions are an important tool in achieving authentication and data integrity. The aim of this paper is to propose a novel one-way hash function based on cellular aut...
Synchronous systems offer clean semantics and an easy verification path at the expense of often inefficient implementations. Capturing design specifications as synchronous models a...
Stavros Tripakis, Claudio Pinello, Albert Benvenis...
Automatic classification of proteins using machine learning is an important problem that has received significant attention in the literature. One feature of this problem is that e...
Arthur Zimek, Fabian Buchwald, Eibe Frank, Stefan ...
During software evolution, programmers spend a lot of time and effort in the comprehension of the internal code structure. Such an activity is often required because the available...