Abstract. In the CB-BUSINESS project (IST-2001-33147, http://www.cbbusiness.com/), a number of administrative services from public agencies and professional chambers in different c...
Dimitris Gouscos, Maria A. Lambrou, Gregoris Mentz...
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
Internet and intranet web sites have become an integral part of software development as well as the wider fields of commercial, educational and recreational activity. In order to...
In this paper a constructive library-aware multilevel logic synthesis approach using symmetries is described. It integrates the technology-independent and technologydependent stag...
Traditionally, region-based image and video coding have been addressed only in the context of low and very low bit-rate coding. However, one of the most interesting by-products of...