Abstract In many scenarios, a database instance violates a given set of integrity constraints. In such cases, it is often required to repair the database, that is, to restore its c...
This work is concerned with the structure of bilinear minimization problems arising in recovering subsampled and modulated images in parallel magnetic resonance imaging. By consid...
This paper proposes a chaotic fingerprint images encryption approach. An image of a fingerprint is encrypted via a twodimensional (2D) chaotic sequence obtained from multi-scrol...
Cunha and Caldieraro (2009) investigated whether sunk-cost effects, which are well documented in hypothetical situations involving monetary investments, also occur in choice situa...
ABC v3 is a stream cipher proposed as a candidate to ECRYPT Estream Project which enters the second evaluation phase. Its key length is 128 bits. In this paper, We show that, ther...