We consider type systems that combine universal types, recursive types, and object types. We study type inference in these systems under a rank restriction, following Leivant'...
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Frameworks and Patterns are important instruments that enable the reuse of successful software solutions in recurrent problems. Geographic information systems, on the other hand, ...
An important activity in the design of a particular database application consists in identifying the integrity constraints that must hold on the database, and that are used to det...
Karla A. V. Borges, Alberto H. F. Laender, Clodove...
: The paper is concerned with the effective and efficient processing of spatiotemporal selection queries under varying degrees of approximation. Such queries may employ operators l...