Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
One way of providing technological support for CoPs is to help participants to produce, structure and share information. As this information becomes more and more multimedia in nat...
This paper presents a conceptual framework and a process model for feature extraction and iconic visualization. Fearaction is viewed as a process of data abstraction, which can pr...
Frank J. Post, Theo van Walsum, Frits H. Post, Deb...
In utilizing the technique of stratification, the user needs to first partition/stratify the sample space; the next task is to determine how to allocate samples to strata. How to ...
Abstract. We propose c2-calculus, which is a second-order polymorphic call-by-value calculus with extensional universal types. Unlike product types or function types in call-by-val...