Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security ...
David P. Gilliam, John D. Powell, Matt Bishop, Chr...
Pen-and-ink line drawing techniques are frequently used to depict form, tone, and texture in artistic, technical, and scientific illustration. In non-photorealistic rendering (NP...
Tobias Isenberg, Petra Neumann, M. Sheelagh T. Car...
Mobile Customer Relationship Management (CRM) services seem to have all the characteristics commonly associated to successful mobile services and have accordingly been predicted a...
Giovanni Camponovo, Yves Pigneur, Andrea Rangone, ...
The distributed, project-oriented nature of digital libraries (DLs) has made them difficult to evaluate in aggregate. By modifying the methods and tools used to evaluate tradition...
This paper describes circuit evolutionary experiments at extreme low temperatures, including the test of all system components at this extreme environment (EE). In addition to hard...
Ricardo Salem Zebulum, Adrian Stoica, Didier Keyme...