ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
: Quality requirements elicitation for new computer applications rests traditionally on interviewing stakeholders. That makes getting these requirements right more complicated than...
Vladimir A. Shekhovtsov, Roland Kaschek, Sergiy Zl...
— Laser scanners are rapidly gaining acceptance as a tool for three dimensional (3D) modeling and analysis in the architecture, engineering, and construction (AEC) domain. Since ...
Daniel Huber, Burcu Akinci, Pingbo Tang, Antonio A...
Call graphs are widely used to represent calling relationships among methods. However, there is not much interest in calling relationships among library methods in many software e...
- NLM's Unified Medical Language System (UMLS) is a very large ontology of biomedical and health data. In order to be used effectively for knowledge processing, it needs to be...
Saurav Sahay, Baoli Li, Ernest V. Garcia, Eugene A...