Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protocol environ...
There is a growing interest in numeric-algebraic techniques in the computer algebra community as such techniques can speed up many applications. This paper is concerned with one su...
Jihun Yu, Chee Yap, Zilin Du, Sylvain Pion, Herv&e...
Schema evolution poses serious challenges in historical data management. Traditionally historical data have been archived either by (i) migrating them into the current schema vers...
Hyun J. Moon, Carlo Curino, MyungWon Ham, Carlo Za...
In this paper, we describe an interface consisting of a virtual showroom where a team of two highly realistic 3D agents presents product items in an entertaining and attractive wa...
Boris Brandherm, Helmut Prendinger, Mitsuru Ishizu...
Today business registries are regarded as means of finding services offered by a business partner. However, business registries might also serve as means of seaching inter-organiza...