This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
We consider a monopolist expert offering a service with a `credence' characteristic. A credence service is one where the customer cannot verify, even after a purchase, whethe...
Laurens G. Debo, L. Beril Toktay, Luk N. Van Wasse...
Abstract. The Verifying Compiler (VC) project proposals suggest that mainstream software developers are its targeted end-users. Like other software engineering efforts, the VC proj...
Data mining has proven a successful gateway for discovering useful knowledge and for enhancing business intelligence in a range of application fields. Incorporating this knowledg...
Andreas L. Symeonidis, Ioannis N. Athanasiadis, Pe...
A kindergarten is an interesting community of young children. The children continuously share their interactions and experiences, and grow along similar developmental stages. In t...
Inseok Hwang, Hyukjae Jang, Lama Nachman, Junehwa ...