tions, allowing interlinking of abstracting and indexing databases with full-text sources, and providing the ability to search across multiple databases simultaneously. Publishers ...
In Greece, there seems to be a growing level of awareness regarding open access among scholars, faculty staff and information professionals. Indeed, consensus regarding the necess...
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Input vector control (IVC) technique utilizes the stack effect in CMOS circuit to apply the minimum leakage vector (MLV) to the circuit at the sleep mode to reduce leakage. Additi...
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...