In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Duality is a well-established concept in quantum physics. It formalises the fact that what one observes is not nature in itself, but--in Heisenberg's words--"nature expo...
Image invariants are those properties of the images of an object that remain unchanged with change in camera parameters, illumination etc. In this paper, we derive an image invari...
This paper presents a systematic approach based on robust statistical techniques for development of a data-driven soft sensor, which is an important component of the process analy...
The Graph Theorem of classical recursion theory states that a total function on the natural numbers is computable, if and only if its graph is recursive. It is known that this res...