The Isomorphism of Polynomials (IP) [28], which is the main concern of this paper, originally corresponds to the problem of recovering the secret key of a C scheme [26]. Besides, t...
Power management techniques for mobile appliances put the components of the systems into low power states to maximize battery life while minimizing the impact on the perceived per...
Face recognition in video has gained wide attention due to its role in designing surveillance systems. One of the main advantages of video over still frames is that evidence accumu...
Modeling software components from multiple perspectives provides complementary views of a software system and enables sophisticated analyses of its functionality. A software compon...
Distributed applications can fail in subtle ways that depend on the state of multiple parts of a system. This complicates the validation of such systems via fault injection, since...
Ramesh Chandra, Ryan M. Lefever, Michel Cukier, Wi...