Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
Collaborative work on unstructured or semistructured documents, such as in literature corpora or source code, often involves agreed upon templates containing metadata. These templ...
: The paper presents decoding positional and color information using visual coded patterns for efficient geometric calibration and color consistency across multiple cameras. The pa...
When software products are assembled from pre-defined components, performance prediction should be based on the components also. This supports rapid model-building, using previous...
Constructing correct distributed systems from their high-level models has always been a challenge and often subject to serious errors because of their non-deterministic and non-at...
Borzoo Bonakdarpour, Marius Bozga, Mohamad Jaber, ...