Software Model-Checking and Testing are some of the most used techniques to analyze software systems and identify hidden faults. While software model-checking allows for an exhaust...
Antonio Bucchiarone, Henry Muccini, Patrizio Pelli...
A mutually anonymous service hides the identity of a client from the service provider and vice-versa. Providing mutual anonymity usually requires a large number of participants. W...
With an aim to high-level understanding of the mathematical contents in a document image the requirement of math-zone extraction and recognition technique is obvious. In this pape...
S. P. Chowdhury, S. Mandal, Amit Kumar Das, Bhabat...
With the rapid growth in the popularity of and the research interest in peer-to-peer (P2P) systems, an interesting question is what the quality of network connectivity between pee...
Abstract. This text describes how persistent object system technology developed in European basic research is being used by a small German startup software company to realize innov...
Andreas Gawecki, Florian Matthes, Joachim W. Schmi...