Model checking and other finite-state analysis techniques have been very successful when used with hardware systems and less successful with software systems. It is especially di...
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same th...
There is increasing interest in novel view reconstruction but less for new time-based views of moving objects as needed for gait biometric deployment. Our interests concern reconst...
In the spatial-integrated socioeconomic model field, a multi-agent approach is appropriate for supporting applications modelled at a detailed territory scale, but it is less used t...
Fenintsoa Andriamasinoro, Daniel Cassard, Bruno Ma...
Users on Twitter, a microblogging service, started the phenomenon of adding tags to their messages sometime around February 2008. These tags are distinct from those in other Web 2...
Jeff Huang, Katherine M. Thornton, Efthimis N. Eft...