In this paper, we present a segmentation method that provides perceptually relevant partitions without any a priori knowledge of the image content: first a local homogeneity analy...
Using visualization and exploration tools can be of great use for the understanding of a software system when only its source code is available. However, understanding a large sof...
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
ML modules provide hierarchical namespace management, as well as fine-grained control over the propagation of type information, but they do not allow modules to be broken up into ...
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...