Efficient determination of processing termination at barrier synchronization points can occupy an important role in the overall throughput of parallel and distributed computing sy...
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
This paper describes a generic approach to structuring and visualising a hypertext-based information space on the WWW. This approach, called Generalised Similarity Analysis (GSA),...
As virtual worlds evolve, so does the visual complexity and customizability of the avatars inside the worlds. In virtual worlds such as Second Life, prospering virtual fashion ind...
Jeffrey Bardzell, Tyler Pace, Laura Brunetti, Qian...
In this paper we want to point out some issues arising when a natural language processing task involves several languages (like multilingual, multidocument summarization and the m...