Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Domain testing, a technique for testing software or portions of software dominated by numerical processing, is intended to detect domain errors that usually arise from incorrect i...
Electronic contracts describe inter-organizational business processes in terms of supply and consumption of electronic services (commonly Web services). In a given contract domain,...
Marcelo Fantinato, Itana Maria de Souza Gimenes, M...
The research question treated in this paper is centered on the idea of exploiting rich resources of one language to enhance the performance of a mention detection system of anothe...
Signal degradation impacts the final quality of images acquired using remote sensing radiometer. The effectiveness of a restoration algorithm strongly depends on two main factors:...
Sebastiano Battiato, Giovanni Puglisi, Rosetta Riz...