A widely accepted prediction is that computing will move to the background, weaving itself into the fabric of our everyday living spaces and projecting the human user into the for...
Maja Pantic, Alex Pentland, Anton Nijholt, Thomas ...
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
In this project (VIRSI) we investigate the promising contentbased retrieval paradigm known as interactive search or relevance feedback, and aim to extend it through the use of syn...
Bart Thomee, Mark J. Huiskes, Erwin M. Bakker, Mic...
Distributed applications or workflows need to access and use compute, storage and network resources simultaneously or chronologically coordinated respectively. Examples are distri...
We provide an algebraic formalisation of connectors in BIP. These are used to structure interactions in a component-based system. A connector relates a set of typed ports. Types a...