Complex scenes such as underground stations and malls are composed of static occlusion structures such as walls, entrances, columns, turnstiles and barriers. Unless this occlusion...
Darrel Greenhill, John-Paul Renno, James Orwell, G...
Cryptographic techniques for reasoning about information leakage have recently been brought to bear on the classical problem of statistical disclosure control – revealing accurat...
Offline partial evaluation techniques rely on an annotated version of the source program to control the specialisation process. These annotations guide the specialisation and have ...
Stephen-John Craig, John P. Gallagher, Michael Leu...
A technique for transformation of definite logic programs is presented. A first phase performs an analysis of the extended call/exit patterns of the source program. It is shown tha...
In this paper, we discuss the issues preventing adoption of analysis, design and modeling (AMD) software development tools. We argue that AMD tools are experiencing the same probl...