Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to...
We introduce the s-Plex Editing problem generalizing the well-studied Cluster Editing problem, both being NP-hard and both being motivated by graph-based data clustering. Instead o...
Jiong Guo, Christian Komusiewicz, Rolf Niedermeier...
Advances in SAT solver technology have enabled many automated analysis and reasoning tools to reduce their input problem to a SAT problem, and then to use an efficient SAT solver ...
The UML is recognized to be the dominant diagrammatic modeling language in the software industry. However, it's support for building interactive systems is still acknowledged ...
Abstract—Putative brain processes responsible for understanding language are based on spreading activation in semantic networks, providing enhanced representations that involve c...