Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through sidechannels. Sensitive information, such as secret keys, can be obtai...
In this work we present a protocol ensuring the eTransaction guarantee (i.e. a recently proposed end-to-end reliability guarantee) in a Web based, three-tier transactional system....
A challenging problem for software engineering practitioners is moving from high-level system architectures produced by system engineers to deployable software produced by softwar...
David Garlan, William K. Reinholtz, Bradley R. Sch...
The Logarithmic Image Processing model (LIP) is a robust mathematical framework for the processing of transmitted and reflected images. It follows many visual, physical and psycho...
To increase the believability and life-likeness of Embodied Conversational Agents (ECAs), we introduce a behavior synthesis technique for the generation of expressive gesturing. A...