Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
This paper describes the architecture of a visual surveillance system that combines real time computer vision algorithms with logic programming to represent and recognize activiti...
Relationships that link static documents discussed during meetings to the corresponding speech transcripts can be of various kinds. The most important ones, thematic links, quotat...
Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fa...
Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Ga...
We report an innovative solely optical architecture to implement the centralized wavelength conversion module of the CWC (Controlled Wavelength Conversion) protocol [1]. The propo...
Georgios I. Papadimitriou, Amalia N. Miliou, Andre...