The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Today's User Interfaces (UIs) are complex software components, which play an essential role in the usability of an application. The development of UIs requires therefore, not ...
In this paper we examine the current computer science curriculum in elementary schools and identify its shortcomings. We then presents a new approach to teaching computer science ...
Any tree can be represented in a max/ma//y compact form as a directed acyclic graph where common subtrees are factored and shared, being represented only once. Such a compaction ca...
Philippe Flajolet, Paolo Sipala, Jean-Marc Steyaer...